IBM - IBM Crypto Workshop
Kurs
In Internet ((Wählen))
Beschreibung
-
Kursart
Kurs
-
Ort
Internet ((Wählen))
-
Dauer
5 Tage
-
Beginn
auf Anfrage
IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will.. Gerichtet an: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_. Kursziele ...
Standorte und Zeitplan
Lage
Beginn
Beginn
Hinweise zu diesem Kurs
Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.
Meinungen
Erfolge dieses Bildungszentrums
Sämtlich Kurse sind auf dem neuesten Stand
Die Durchschnittsbewertung liegt über 3,7
Mehr als 50 Meinungen in den letzten 12 Monaten
Dieses Bildungszentrum ist seit 15 Mitglied auf Emagister
Themen
- Management
- Basic
- CCA
- Telekommunikation
- Hardware
- IBM
- Engineering
Inhalte
IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_
_x000D_
This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_
Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.
ZIELGRUPPE
This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_
_x000D_
This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_
Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.
KURSINHALT
The first part of the course covers the correct use of cryptographic technology and Hardware Security Modules (HSM) in order to set up closed cryptographic systems. The second part deals with implementation using IBM hardware and software solutions; participants are familiarised with the use of the Crypto Express2 (CEX2) feature of System z, the ICSF, the Trusted Key Entry Workstation (Version 5), and the implementation of IBM's Common Cryptographic Architecture (CCA) on the System z mainframe. Finally, standard IBM cryptographic solutions (disk and tape encryption, System SLL) based on hardware cryptography are considered, together with the central key management solutions 'Distributed Key Management System' (DKMS) and Tivoli Key Lifecycle Manager' (TKLM). Themenübersicht
Monday - Basic principles and verifiable security
- The basic principles of applied cryptography
- Verifiable security
- Biometrics
- An ideal cryptographic infrastructure
- Cryptography concepts
- CCA-based cryptography
- Overview of IBM 4764 and ICSF
- Cryptography overview and implementation (ICSF-based)
- CCA keys, CVs and datasets
- ICSF crypto implementation
- Crypto microcode loading process
- Master keys
- Trusted Key Entry (TKE) workstation
- Use of cryptography on mainframes - part 1
- ICSF and other exploiters (PCF, zLinux, zVM, RACF, SSL, non-CCA)
- Key Generation Utility Program (KGUP)
- ICSF and SYSPLEX
- Application programming
- Use of cryptography on mainframes (ICSF-based) - Part 2
- ICSF logging and performance
- ICSF other open issues
- User Defined Extensions (UDX)
- System SSL, Tape Encryption, EF (Encryption Facility) for z/OS, RACF, DKMS
- Distributed Key Management System (DKMS)
- TKLM (Tivoli Key Lifecycle Manager)
- EKM (Encryption Key Manager), tape and disk encryption
- System SLL
- Miscellaneous
- Questions and discussion
The workshop is held in English although problems and questions can also be discussed in German.
Maschinen Anforderungen
To demonstrate and practise the different CCA technologies, the training room is equipped with PCs with an IBM 4764 crypto card, allowing participants to try out CCA concepts if they wish to do so. (No exercises are offered on this).
_x000D_
VORRAUSSETZUNG
Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.
IBM - IBM Crypto Workshop