Keeping the valuables safe
Did you know that IBM® Information Management System (IMS™) isn’t just a legacy system sitting quietly in a data center? It’s the unsung hero behind the scenes, powering large enterprises in industries such as banking, insurance, airlines, and retail—none of which can afford a security breach.
Those companies need maximum security to keep assets, code, and processes safe. 
The good news is that you can take advantage of many IMS facilities to protect those assets. 
If you’re a database system programmer, database administrator, or responsible for securing IMS assets and resources, this course is your blueprint for implementing IMS security. 
You’ll walk through identifying the resources that can be protected, such as user IDs, transactions, commands, data sets, and databases. Then, you’ll learn what facilities you can use to protect those items, such as what is covered with the default security, security facilities, exits, encryption, and RACF.

Learning objectives
After completing this course, you should know how to:
- Identify the IMS resources that must be protected
- Identify the types of security facilities available for each resource
- Develop a plan to implement security on your IMS systems
- Identify the tasks required in IMS and RACF to implement security
- Implement security for each resource using an appropriate security facility
- Code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, Program Specification Blocks (PSB), terminals and other resources
Prerequisites
Before taking this course, you should have working knowledge and experience with IMS administration and Resource Access Control Facility (RACF).
Course outline 
Unit 1: Introduction to IMS Security 
Unit 2: IMS Security Facilities 
Unit 3: IMS Security Options 
Unit 4: IMS Exits 
Quiz 1
Unit 5: Commands Used for Changing Security 
Unit 6: Log Records
Unit 7: SAF and RACF 
Unit 8: User ID and Sign-on Verification 
Unit 9: Securing the Control Region 
Quiz 2
Unit 10: Common Service Layer Security 
Unit 11: IMS Connect and OTMA 
Unit 12: Transaction Security 
Unit 13: Command Security 
Unit 14: Security for Time Controlled Operations
Quiz 3
Unit 15: IMS Resource Access Security (RAS) 
Unit 16: IMS Database Security 
Unit 17: IMS Data Set Security 
Unit 18: Securing a DBCTL Environment 
Unit 19: IMS and Db2 Security
Quiz 4
Final exam
So even if you’ve implemented many IMS security protections across your enterprise, be sure that you didn’t miss anything that can still be better protected by completing this course and getting that digital badge.
If you successfully complete the course, you'll get a digital badge!
You'll need an IBM account to enroll in the course and a Credly account to accept the badge.
Start the Implementing IMS Security course on IBM Training today!
Check out IMS Central for more IMS courses and videos.
