This is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.
-
This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.
The course consists of six units and 12 hands-on lab exercises.
-
This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
-
This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.
Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.
Hands-on labs
This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload
-
This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.
-
This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.
-
This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.
-
This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.
-
This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.
-
Validate your expertise and get the leverage you need to move up in your career.
In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.
Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024 | Career Advancement
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The only globally accepted IT risk management certification for professionals with three or more years of experience.
This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.
The artificial intelligence revolution is rewriting the rules of cybersecurity, and the financial stakes are massive. AI-powered cybersecurity will skyrocket from $15 billion in 2021 to a staggering $135 billion by the end of the decade – Artificial Intelligence in Cybersecurity Market Analysis
In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.
The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.






