The layered approach of SAF, ESMs (RACF, ACF2, Top Secret), and how they interact with COBOL programs. - **RACF fundamentals** --- Users, groups, profiles, and the five access levels (NONE, READ, UPDATE, CONTROL, ALTER) that control resource access. - **Dataset security** --- Discrete and generic pr