icon_CloudMgmt icon_DollarSign icon_Globe icon_ITAuto icon_ITOps icon_ITSMgmt icon_Mainframe icon_MyIT icon_Ribbon icon_Star icon_User icon_Users icon_VideoPlay icon_Workload icon_caution icon_close s-chevronLeft s-chevronRight s-chevronThinRight s-chevronThinRight s-chevronThinLeft s-chevronThinLeft s-trophy s-chevronDown

BMC AMI Command Center for Security 6.x: Fundamentals Using (WBT)

BMC AMI Security automatically protects, detects, and responds to threats on your mainframe. Acting as a virtual security expert, it uses out-of-the-box policies to harden the mainframe environment against vulnerabilities, insider threats, and data theft. Actionable insights help incident responders investigate and close the window of opportunities for hackers.

BMC AMI Command Center for Security provides dashboard views, SIEM correlation, and text message alerts of security events from z/OS. It integrates RACF, CICS, DFSMS, and Db2 to fight against threats or failed access attempts in real time. In this course, learners will be able to explore the BMC AMI Command Center web interface and learn in detail about all the core tabs and their functionalities. Users will also experience a guided simulation to enhance their understanding of the product.

Major release:

BMC AMI Security 6.x

Good for:

Administrators, IT Managers, System Programmers

Course Delivery:

Web Based Training (WBT) | 2 hours

Course Modules

  • Module 2: Dashboards
    • Describe Dashboards
    • Define features of the Dashboards
    • Describe different types of Dashboards
    • Demonstrate how to work with the Dashboards
    • Explain the concept of the Span Parameter
    • Describe the Refresh Rate of each panel of the Dashboard
  • Module 3: Messages
    • Understanding Messages
    • Searching and querying message data
    • Analyzing messages
    • Explaining how to find messages
    • Demonstrating how to set up a message forwarding rule
  • Module 4: Correlation Threads
    • Explain Correlation Threads
    • Explain the relationship between Indicators of Compromise (I.O.C) and Correlation Threads
    • Describe the Correlation components
    • Explain Correlation Rules
  • Module 5: Alerts and Tickets
    • Describe the Alerts and Tickets tab
    • Define the features of the Alerts and Tickets tabs and sub-tabs
    • Describe Counters, Devices, Users, Patterns, Custom, Automated Response, and Config+ tabs
    • Describes how to add and update alerts on the various subtabs
    • Describe the Opened, Closed, Actions, and Config+ tabs
    • Concepts of Adapter and plug-ins
  • Module 6: Reports
    • Describe the Reports tab
    • Explain Network Listener
    • Understand Network Forwarder
    • Define System Advisory