You searched for: ""

  • 10 Days Days ILT, VILT

    This course is designed to give new hire IT professionals an introduction into the IBM Z environment. The IBM mainframe servers, operating systems and software products will be discussed. Through lecture and hands-on labs, this course will provide the basic skill set to jump start productivity for technical professionals who are new to the mainframe environment. The skills taught in this course can be applied across multiple mainframe job roles. This course consists of 16 lecture units and 11 lab exercises.

  • 5 Days ILT, VILT

    This course is designed to prepare students to install and configure a highly available cluster using PowerHA System Mirror.

  • 3 Days ILT, VILT

    Organizations are compelled to find effective and cost-efficient data security solutions.

    Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.

    IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.

    z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:

    • Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
    • New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
    • Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
    • In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
    • In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
    • These exercises reinforce the concepts and technologies being covered in the lectures.
  • 3 Days ILT, VILT

    This course will expose the beginning z/OS DBAs (Database Administrators) to fundamentals of Database Administration for a Db2 12 for z/OS. This course will teach the students how to physically implement a logical database design using DDL, and teaches considerations of referentially related tables. This course discusses the use of basic utilities, program preparation, serialization, and basic database security. This course does not cover distributed data processing, nor does it cover data sharing.

  • 5 Days ILT, VILT

    This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment.

  • 4 Days ILT, VILT

    Learn to write easy to use and efficient control language (CL) programs which may be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input).

    You will learn to write Control Language (CL) programs which may be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input).

  • 3 Days ILT, VILT

    To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.

  • 5 Days ILT, VILT

    This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.

    You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.

    You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.

  • 3 Days ILT, VILT

    This is the follow on course to AS24G. This course teaches advanced operator skills. OL19G may also interest this student.

    This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC. We will discuss the IBM i Access Family of products in general and Access Client Solutions, specifically. We will discuss the different types of security that you can implement in order to control who has access to your data and what they can do with that data if they are allowed to access. We will discuss security control via system values, user and group profiles, authorization lists, and adopted authority. This course will help you develop additional skills in the areas of work management and how to create a basic CL program. In the area of CL programming, we discuss concepts of programming, then how to create a basic CL program using the traditional application development tools PDM and SEU. Then, you will learn how to use the GUI tools in RDP (RSE and LPEX). You will also learn the steps to create a menu using SDA. You will learn some tips that you can use to help improve your IBM i operations. We will also discuss how you can use Management Central as a tool to manage a single system or a network of TCP/IP connected Power Systems with IBM i.

  • 4 Days ILT, VILT

    This course will help you to better understand the techniques of performance analysis and capacity planning on systems and partitions running IBM i and develop an appreciation of how IBM i operates and interfaces with applications. This course is expected to build skills to better manage performance and capacity on systems and partitions running IBM i.

    The course explains IBM i concepts, including the Technology Independent Machine Interface (TIMI), main storage pools, auxiliary storage pools, management of jobs, threads, and tasks, job run-time structure, performance monitoring, data collection, and analysis of performance data.

    This course includes hands-on activities using performance data from IBM i systems to help the student appreciate the concepts discussed. This course is designed for those running Power Systems on IBM i. While it includes i 7.2 content, it is suitable for those currently using prior versions of IBM i.

    The first part of this course (units 1-6) focus on teaching the performance management process, the performance considerations of key hardware components and virtualization options, and tuning options to help optimize performance. During these lectures, students should gain an appreciation of the unique storage management and work management components in the IBM i architecture and how these components need to be managed for optimal performance.

    The second part of this course focuses on the tools and techniques to monitor, analyze, and plan for performance of Power Systems with IBM i and Logical partitions (LPARs).

    The primary analysis tool that will be used is the Performance Data Investigator (PDI) which is included with IBM Navigator for i. PDI is also used with IBM Systems Workload Estimator (WLE) for capacity planning activities.

  • 5 Days ILT, VILT

    This course is designed to teach you how to use z/OS Job Control Language (JCL) and selected z/OS utility programs in an online batch environment. Both Storage Management Subsystem (SMS) and non-SMS JCL are discussed. Machine lab exercises complement the lecture material.

  • 2 Days ILT, VILT, SPVC

    Learn to explore, summarize and interpret data like a pro.

    This 0G51BG: Statistical Analysis Using IBM SPSS Statistics v26 course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships.

    Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results.

Go to Top