At a glance
View schedule & enroll Sorted by: location or date
Course number HB518S
Length 5 days
Delivery method Instructor-led training (ILT)
Onsite dedicated training (OST)
Price USD $4,000
*Courses are supported in the delivery formats above, but are not necessarily scheduled in every delivery format listed. Please click the schedule links at the top of the page to see which delivery formats are currently scheduled.

Course overview

This course teaches all aspects of security theory and practice as it relates to the OpenVMS operating system, including physical, data and object security, account management, system reliability, networks and encryption, auditing and reporting, and additional security enhancements. The course incorporates our Lab+Lecture format.


  • Completion of OpenVMS fundamentals (U3716S)
  • Completion of OpenVMS system management I: essentials for established systems (U3724S)


  • System, Network and Security Administrators of OpenVMS systems who want to effectively manage a secure operating environment.

Ways to save

Benefits to you

Upon completion of this course, students will understand security and how it relates to their OpenVMS systems. They will be able to set up a secure environment that limits interference with production.

Next steps

  • Managing complex HP OpenVMS systems (U3726S)
  • HP OpenVMS system performance management (U3727S)
  • TCP/IP services for HP OpenVMS (U3728S)

Course outline

Security Overview

  • Need for Security
  • Ignorance is Bliss - But it is Not Security
  • Vulnerabilities
  • Prevention vs. Detection
  • Security Policy
  • User Training
  • OpenVMS Builtin Security 

Physical and Data Security

  • Console Terminal
  • Conversational Boot
  • Separation of Duties
  • Device Access
  • Data Security 

OpenVMS Object Security

  • Information Security
  • Types of Access
  • UIC
  • Categories of Processes
  • Classes of Objects
  • UIC Based Security
  • Access Control List Protection
  • Protected Subsystems
  • Privileges Affecting Object Security
  • System Parameters Affecting Object Security
  • Rules of Access
  • File and Volume Security
  • Security Templates
  • Device Security
  • Queue Security
  • Erasing Data on Memory-Based Objects

Account Management

  • Accountability
  • Managing Accounts
  • Common System Accounts
  • UAF Flags
  • Expiring Accounts
  • UAF Files
  • Process Privileges
  • Captive and Restricted Accounts
  • Process Resources
  • General Account Guidelines
  • What to do When Someone Leaves
  • Reviewing System UAF

Login Security

  • Authentication, Authorization, Accounting and Auditing (AAAA)
  • Passwords
  • Programmed Control over Login Authentication
  • External Authentication
  • Automatic Login Facility
  • Limiting Access to Accounts
  • Breakin Detection
  • Modem Setup
  • Virtual Terminals
  • Password Grabber Programs
  • Process Environment

System Reliability

  • Process Priority
  • Process Quotas and Limits
  • Avoiding System Hangs

Network Security

  • Proxy Access
  • Network Hubs vs. Switches and Routers
  • Network Applications
  • Firewalls
  • Network Based Attacks
  • Wireless Networking

Encrypted Network Communication

  • Secure Shell
  • Secure File Transfers
  • Secure Sockets Layer (SSL)
  • Kerberos
  • Virtual Private Network
  • OpenVMS IPsec

Security Auditing and Reporting

  • Security Data
  • Components Involved in Security Auditing
  • Viewing Audit Server Settings
  • Determining Event Types to be Recorded
  • Preventing Changes to Security Auditing Settings
  • Security Audit Log File
  • Security Reporting
  • Security Server
  • Operator Communications
  • Accounting
  • Error Logs

Other Security Concerns

  • Logical Names
  • INSTALL Utility
  • System Startup
  • Changes to Applications and Procedures
  • Security Enhancements
  • Security Patches
  • Secure Delivery
  • System Files
  • Cluster Security
  • User Terminal Security
  • Workstation Security
  • COM for OpenVMS

Recovering from an Intrusion

  • Scope of the Intrusion
  • Restore System, Layered Products and Data
  • Deter Further Attempts
  • Plan Ahead