This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.
-
This course is designed to give new hire IT professionals an introduction into the IBM Z environment. The IBM mainframe servers, operating systems and software products will be discussed. Through lecture and hands-on labs, this course will provide the basic skill set to jump start productivity for technical professionals who are new to the mainframe environment. The skills taught in this course can be applied across multiple mainframe job roles. This course consists of 16 lecture units and 11 lab exercises.
-
Organizations are compelled to find effective and cost-efficient data security solutions.
Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.
IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.
z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:
- Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
- New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
- Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
- In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
- In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
- These exercises reinforce the concepts and technologies being covered in the lectures.
-
Service Integration and Management (SIAM) is a methodology used to manage and seamlessy integrate multiple service providers to ensure a single business-facing IT organization.
The EXIN SIAM™ Professional certification tests a candidate’s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.
-
The ESOCMS02326: Artificial Intelligence and Machine Learning training course provides a detailed description about the technical and operational aspect of AI and ML and helps the learners to understand the concepts of AI, ML, neural network, reinforcement learning, NLP and artificial ecosystem. It also provides a detailed description about the need of AI ready infrastructure, AI and ML frameworks, implemented machine learning models, and use cases across the industry.
The offering is an engaging mix of key technologies, case examples, and business insights. The course includes recorded lab exercise demonstrations explaining the techniques of machine learning, neural network, reinforcement learning, and infrastructure in detail.
-
The EXIN SIAM™ Foundation credential validates a professional’s knowledge about bringing together multiple service providers to strive for a common goal in order to support the client organization’s agreed objectives for service delivery.
This certification includes the following topics:
- introduction to SIAM
- SIAM implementation roadmap
- SIAM roles and responsibilities
- SIAM practices
- processes to support SIAM
- SIAM challenges and risks
- SIAM and other practices.
SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization. A synonym for Service Integration and Management (SIAM™) is multi-sourcing integration (MSI). In this certification, the term SIAM is used. The EXIN SIAM™ Foundation certification tests a candidate’s knowledge and understanding of the terminology and the core principles. The certification covers themes such as: potential benefits as well as the challenges and risks of implementing SIAM. It also includes examples of implementation structures, governance, tooling and data considerations and the common processes used in a SIAM ecosystem. A candidate who successfully completes this certification knows how SIAM delivers business value and is able to contribute to the implementation and use of SIAM in an organization.
-
This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.
The course consists of six units and 12 hands-on lab exercises.
-
This ES722OCMDSBDA: Data Science and Big Data Analytics v2 course provides practical foundation level training that enables immediate and effective participation in Big Data and other analytics projects. It includes an introduction to Big Data and the data analytics lifecycle to address business challenges that leverage Big Data.
The course provides grounding in basic and advanced analytic methods and an introduction to Big Data analytics technology and tools, including MapReduce and Hadoop. Labs offer opportunities for students to understand how these methods and tools may be applied to real world business challenges by a practicing data scientist.
The course takes an “open”, or technology-neutral approach and includes a final lab which addresses a big data analytics challenge by applying the concepts taught in the course in the context of the data analytics lifecycle. The course prepares the student for the Dell EMC Proven™ Professional Data Scientist Associate (EMCDSA) certification exam.
-
This instructor-led workshop covers the content and hands-on lab exercises provided in the following courses: Data Warehousing with SQL and NoSQL, ETL Offload with Hadoop and Spark, Data Governance, Security and Privacy for Big Data, Processing Streaming and IoT Data, Building Data Pipelines with Python.
This training prepares the learner for a major portion of the Dell Technologies Proven Professional data engineering specialist-level certification exam (DES-7DE1). Review the exam description document to understand all the related data engineering training and consumption options.
-
This ES712OCMCIPD2: Cloud Infrastructure Planning and Design v2 course explores the business needs and challenges that have led the organization to adopt a cloud solution. This course highlights the benefits, challenges, and considerations of design choices and emphasizes the importance of proper requirements gathering in the design process. Additionally, students are provided with opportunities to practice these new skills while performing exercises and labs. This course prepares the student for the Dell EMC Proven Professional Cloud Architect certification exam.
-
System z continues to extend the value of the mainframe by leveraging robust security solutions to help meet the needs of today’s on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and life cycle management, improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z/OS Intrusion Detection Services. This advanced z/OS security course presents the evolution of the current z/OS security architecture and explores in detail the various technologies involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF), and z/OS Integrated Security Services.
In the hands-on exercises, you begin with your own z/OS HTTP Server in a TCP/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication by using RACF, SSL and the use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services and RACF auto registration. You will also implement different scenarios to implement ssl security for a typical tcpip application; FTP: SSL, TLS, server authentication, client certificates and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures.
-
This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.
Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.
Hands-on labs
This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload
-
This course is designed to teach you the basic skills required to write programs using the Rexx language in the standard z/OS environments: TSO, ISPF, and MVS. The course covers the TSO extensions to Rexx, the interface with ISPF, and interaction with other environments such as the MVS console, and running Rexx in batch jobs, and compiling Rexx.
-
This is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.
-
To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.
-
This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.
You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.
You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.
-
This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain in-depth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers.
-
This course presents the structure and control blocks of the z/OS BCP and system services. It prepares the new z/OS system programmer to identify potential bottlenecks and performance problems, perform initial error symptom gathering, and identify opportunities and requirements for tailoring a z/OS system. This course also provides prerequisite information needed for further training in specialized areas such as system measurement and tuning and system problem determination.
-
This classroom ES15G: z/OS Facilities course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). It teaches the students the functions of major software base elements in the management of jobs, tasks, storage, data, and problems. It also addresses how these functions can be affected by the system programmer.
Students are introduced to the services provided by the servers which execute in the z/OS environments, such as the Communications Server and the Security Server. Installation packaging options and steps to install the z/OS environments also are introduced.








