<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="19206" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/ibm-ess10g" lastchanged="2025-09-12T14:25:02+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Pervasive Encryption on z/OS</title><productcode>ESS10G</productcode><vendorcode>IB</vendorcode><vendorname>IBM</vendorname><fullproductcode>IB-ESS10G</fullproductcode><version>1</version><essentials>&lt;ul&gt;

	&lt;li&gt;General z/OS knowledge, including basic UNIX System Services skills&lt;/li&gt;&lt;li&gt;Basic knowledge of RACF&lt;/li&gt;&lt;li&gt;Curriculum relationship

	

o [ES66G]&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.&lt;/p&gt;</audience><contents>&lt;ul&gt;

	&lt;li&gt;Describe the components of Pervasive Encryption on z/OS&lt;/li&gt;&lt;li&gt;Explain the role of encryption for data protection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;2&lt;/p&gt;
&lt;ul&gt;

	&lt;li&gt;Implement hardware crypto on your z System&lt;/li&gt;&lt;li&gt;Load and activate AES Master Keys&lt;/li&gt;&lt;li&gt;Implement and start ICSF&lt;/li&gt;&lt;li&gt;Understand the differences between secure keys clear keys and protected keys&lt;/li&gt;&lt;li&gt;Describe how are key values used for encryption and decryption&lt;/li&gt;&lt;li&gt;Generate, maintain and manage Keys&lt;/li&gt;&lt;li&gt;Setup access to key labels&lt;/li&gt;&lt;li&gt;Setup policy to supply key label (RACF SMS JCL)&lt;/li&gt;&lt;li&gt;Access data in encrypted data sets&lt;/li&gt;&lt;li&gt;Create encrypted data sets - Supplying key labels&lt;/li&gt;&lt;li&gt;Convert existing data sets to encryption&lt;/li&gt;&lt;li&gt;Verify encryption status&lt;/li&gt;&lt;li&gt;Encrypt Data in Transit&lt;/li&gt;&lt;li&gt;Encrypt Data at Rest&lt;/li&gt;&lt;li&gt;Manage data sets, data keys, and key labels&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;ul&gt;

	&lt;li&gt;Describe the components of Pervasive Encryption on z/OS&lt;/li&gt;&lt;li&gt;Explain the role of encryption for data protection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;2&lt;/p&gt;
&lt;ul&gt;

	&lt;li&gt;Implement hardware crypto on your z System&lt;/li&gt;&lt;li&gt;Load and activate AES Master Keys&lt;/li&gt;&lt;li&gt;Implement and start ICSF&lt;/li&gt;&lt;li&gt;Understand the differences between secure keys clear keys and protected keys&lt;/li&gt;&lt;li&gt;Describe how are key values used for encryption and decryption&lt;/li&gt;&lt;li&gt;Generate, maintain and manage Keys&lt;/li&gt;&lt;li&gt;Setup access to key labels&lt;/li&gt;&lt;li&gt;Setup policy to supply key label (RACF SMS JCL)&lt;/li&gt;&lt;li&gt;Access data in encrypted data sets&lt;/li&gt;&lt;li&gt;Create encrypted data sets - Supplying key labels&lt;/li&gt;&lt;li&gt;Convert existing data sets to encryption&lt;/li&gt;&lt;li&gt;Verify encryption status&lt;/li&gt;&lt;li&gt;Encrypt Data in Transit&lt;/li&gt;&lt;li&gt;Encrypt Data at Rest&lt;/li&gt;&lt;li&gt;Manage data sets, data keys, and key labels&lt;/li&gt;&lt;/ul&gt;</outline><essentials_plain>- General z/OS knowledge, including basic UNIX System Services skills
- Basic knowledge of RACF
- Curriculum relationship

	

o [ES66G]</essentials_plain><audience_plain>This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.</audience_plain><contents_plain>- Describe the components of Pervasive Encryption on z/OS
- Explain the role of encryption for data protection
2



	- Implement hardware crypto on your z System
- Load and activate AES Master Keys
- Implement and start ICSF
- Understand the differences between secure keys clear keys and protected keys
- Describe how are key values used for encryption and decryption
- Generate, maintain and manage Keys
- Setup access to key labels
- Setup policy to supply key label (RACF SMS JCL)
- Access data in encrypted data sets
- Create encrypted data sets - Supplying key labels
- Convert existing data sets to encryption
- Verify encryption status
- Encrypt Data in Transit
- Encrypt Data at Rest
- Manage data sets, data keys, and key labels</contents_plain><outline_plain>- Describe the components of Pervasive Encryption on z/OS
- Explain the role of encryption for data protection
2



	- Implement hardware crypto on your z System
- Load and activate AES Master Keys
- Implement and start ICSF
- Understand the differences between secure keys clear keys and protected keys
- Describe how are key values used for encryption and decryption
- Generate, maintain and manage Keys
- Setup access to key labels
- Setup policy to supply key label (RACF SMS JCL)
- Access data in encrypted data sets
- Create encrypted data sets - Supplying key labels
- Convert existing data sets to encryption
- Verify encryption status
- Encrypt Data in Transit
- Encrypt Data at Rest
- Manage data sets, data keys, and key labels</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="CH" currency="CHF">2350.00</price><price country="FR" currency="EUR">2550.00</price></pricelist><miles/></course>