IBM - IBM Crypto Workshop

PROKODA Gmbh
In Internet ((Wählen))

2.900 
Möchten Sie den Bildungsanbieter lieber direkt anrufen?
0221/... Mehr ansehen

Wichtige informationen

  • Workshop
  • Internet ((Wählen))
  • Dauer:
    5 Tage
Beschreibung

IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will..
Gerichtet an: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies.. This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_. Kursziele ...

Wichtige informationen
Veranstaltungsort(e)

Wo und wann

Beginn Lage
auf Anfrage
Internet
Internet Virtual Cl, 20097, (Wählen), (Wählen)

Häufig gestellte Fragen

· Voraussetzungen

Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.

Themenkreis

KURSZIEL
IBM - IBM Crypto Workshop: This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_

_x000D_

This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_

Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.


ZIELGRUPPE
This workshop is designed for decision-makers and managers, architects, designers, developers, technicians and operators of security solutions using cryptographic technologies. _x000D_

_x000D_

This workshop addresses persons responsible for the specification and implementation of cryptographic systems that use ICSF. Therefore the target group will comprise system developers, system analysts, and system and application programmers in particular._x000D_

Kursziele
Attending the first part of the workshop the participants understand how to check that cryptographic procedures and HSM are being used correctly.
The second part of the workshop enables the participants to securely configure, program and operate IBM's ICSF and Common Cryptographic Architecture (CCA).
The final part provides an overview of the IBM crypto solutions based on CCA. An insight into the world of key administration is also provided.


KURSINHALT
The first part of the course covers the correct use of cryptographic technology and Hardware Security Modules (HSM) in order to set up closed cryptographic systems. The second part deals with implementation using IBM hardware and software solutions; participants are familiarised with the use of the Crypto Express2 (CEX2) feature of System z, the ICSF, the Trusted Key Entry Workstation (Version 5), and the implementation of IBM's Common Cryptographic Architecture (CCA) on the System z mainframe. Finally, standard IBM cryptographic solutions (disk and tape encryption, System SLL) based on hardware cryptography are considered, together with the central key management solutions 'Distributed Key Management System' (DKMS) and Tivoli Key Lifecycle Manager' (TKLM). Themenübersicht
Monday - Basic principles and verifiable security
  • The basic principles of applied cryptography
  • Verifiable security
  • Biometrics
  • An ideal cryptographic infrastructure
Tuesday - Cryptography / Common Cryptographic Architecture
  • Cryptography concepts
  • CCA-based cryptography
  • Overview of IBM 4764 and ICSF
Wednesday - Cryptography on System z
  • Cryptography overview and implementation (ICSF-based)
  • CCA keys, CVs and datasets
  • ICSF crypto implementation
  • Crypto microcode loading process
  • Master keys
  • Trusted Key Entry (TKE) workstation
Thursday - Cryptography on System z
  • Use of cryptography on mainframes - part 1
    • ICSF and other exploiters (PCF, zLinux, zVM, RACF, SSL, non-CCA)
    • Key Generation Utility Program (KGUP)
    • ICSF and SYSPLEX
    • Application programming
  • Use of cryptography on mainframes (ICSF-based) - Part 2
    • ICSF logging and performance
    • ICSF other open issues
    • User Defined Extensions (UDX)
    • System SSL, Tape Encryption, EF (Encryption Facility) for z/OS, RACF, DKMS
Friday - Cryptographic solutions and standards
  • Distributed Key Management System (DKMS)
  • TKLM (Tivoli Key Lifecycle Manager)
  • EKM (Encryption Key Manager), tape and disk encryption
  • System SLL
  • Miscellaneous
  • Questions and discussion
Hinweise
The workshop is held in English although problems and questions can also be discussed in German.
Maschinen Anforderungen
To demonstrate and practise the different CCA technologies, the training room is equipped with PCs with an IBM 4764 crypto card, allowing participants to try out CCA concepts if they wish to do so. (No exercises are offered on this).
_x000D_

VORRAUSSETZUNG
Basic knowledge of IT security and applied cryptography is useful. However such knowledge is not absolutely essential to learn the many interesting subjects offered by this workshop.

Vergleichen Sie diesen Kurs mit ähnlichen Kursen
Mehr ansehen