IBM - IBM Crypto Workshop

Kurs

In Internet ((Wählen))

Preis auf Anfrage

Beschreibung

  • Kursart

    Kurs

  • Ort

    Internet ((Wählen))

  • Dauer

    5 Tage

  • Beginn

    auf Anfrage

IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will.. Gerichtet an: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_. Kursziele ...

Standorte und Zeitplan

Lage

Beginn

Internet ((Wählen))

Beginn

auf AnfrageAnmeldung möglich

Hinweise zu diesem Kurs

Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.

Fragen & Antworten

Ihre Frage hinzufügen

Unsere Berater und andere Nutzer werden Ihnen antworten können

Wer möchten Sie Ihre Frage beantworten?

Geben Sie Ihre Kontaktdaten ein, um eine Antwort zu erhalten

Es werden nur Ihr Name und Ihre Frage veröffentlicht.

Meinungen

Erfolge dieses Bildungszentrums

2020

Sämtlich Kurse sind auf dem neuesten Stand

Die Durchschnittsbewertung liegt über 3,7

Mehr als 50 Meinungen in den letzten 12 Monaten

Dieses Bildungszentrum ist seit 15 Mitglied auf Emagister

Themen

  • Management
  • Basic
  • CCA
  • Telekommunikation
  • Hardware
  • IBM
  • Engineering

Inhalte

KURSZIEL
IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_

_x000D_

This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_

Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.


ZIELGRUPPE
This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_

_x000D_

This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_

Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.


KURSINHALT
The first part of the course covers the correct use of cryptographic technology and Hardware Security Modules (HSM) in order to set up closed cryptographic systems. The second part deals with implementation using IBM hardware and software solutions; participants are familiarised with the use of the Crypto Express2 (CEX2) feature of System z, the ICSF, the Trusted Key Entry Workstation (Version 5), and the implementation of IBM's Common Cryptographic Architecture (CCA) on the System z mainframe. Finally, standard IBM cryptographic solutions (disk and tape encryption, System SLL) based on hardware cryptography are considered, together with the central key management solutions 'Distributed Key Management System' (DKMS) and Tivoli Key Lifecycle Manager' (TKLM). Themenübersicht
Monday - Basic principles and verifiable security
  • The basic principles of applied cryptography
  • Verifiable security
  • Biometrics
  • An ideal cryptographic infrastructure
Tuesday - Cryptography / Common Cryptographic Architecture
  • Cryptography concepts
  • CCA-based cryptography
  • Overview of IBM 4764 and ICSF
Wednesday - Cryptography on System z
  • Cryptography overview and implementation (ICSF-based)
  • CCA keys, CVs and datasets
  • ICSF crypto implementation
  • Crypto microcode loading process
  • Master keys
  • Trusted Key Entry (TKE) workstation
Thursday - Cryptography on System z
  • Use of cryptography on mainframes - part 1
    • ICSF and other exploiters (PCF, zLinux, zVM, RACF, SSL, non-CCA)
    • Key Generation Utility Program (KGUP)
    • ICSF and SYSPLEX
    • Application programming
  • Use of cryptography on mainframes (ICSF-based) - Part 2
    • ICSF logging and performance
    • ICSF other open issues
    • User Defined Extensions (UDX)
    • System SSL, Tape Encryption, EF (Encryption Facility) for z/OS, RACF, DKMS
Friday - Cryptographic solutions and standards
  • Distributed Key Management System (DKMS)
  • TKLM (Tivoli Key Lifecycle Manager)
  • EKM (Encryption Key Manager), tape and disk encryption
  • System SLL
  • Miscellaneous
  • Questions and discussion
Hinweise
The workshop is held in English although problems and questions can also be discussed in German.
Maschinen Anforderungen
To demonstrate and practise the different CCA technologies, the training room is equipped with PCs with an IBM 4764 crypto card, allowing participants to try out CCA concepts if they wish to do so. (No exercises are offered on this).
_x000D_

VORRAUSSETZUNG
Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.

IBM - IBM Crypto Workshop

Preis auf Anfrage