This course teaches database administrators various features they must be familiar with as DB2 11 for z/OS Database Administrators. These include program preparation, online schema changes, user defined functions, archive-enabled and temporal tables, partition management, stored procedures, and triggers. The course includes many hands-on demonstrations which give the students experience with the included topics. Additionally, there is information on other features in the course appendices, including schemas and user defined data types, clone tables, materialized query tables, large objects, global variables, and row permissions and column masks. This course is a follow-on course to CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1. Note: This course is 3 days in length. If the instructor has time, he can cover the optional appendices as desired.
-
This course will expose the beginning z/OS DBAs (Database Administrators) to fundamentals of Database Administration for a Db2 12 for z/OS. This course will teach the students how to physically implement a logical database design using DDL, and teaches considerations of referentially related tables. This course discusses the use of basic utilities, program preparation, serialization, and basic database security. This course does not cover distributed data processing, nor does it cover data sharing.
-
The course is updated for DB2 10 for z/OS. This course is the classroom delivered version of the Instructor led Online course
- DB2 10 for z/OS System Administration – ILO (3V851).
Administrators of DB2 10 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 10 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:
- Relate the z/OS IPL process to a DB2 subsystem
- Explain effects of stopping and starting DB2
- Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
- The use of DSN command processor running in batch and foreground
- Use views to minimize your ability to see into the DB2 catalog
- See how the catalog (through grant activity) controls access to data
- Search the catalog for problem situations
- Use the catalog and DB2 utilities to determine data recovery requirements
- Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
- Implement DB2 and Resource Access Control Facility (RACF) security
- Describe DB2 program flow for all environments
- Display normal and problem threads and database status
- See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
- Interpret lock displays
- Identify and cancel particular threads
- Describe available DB2 utilities to manage system and user page sets
-
Administrators of DB2 11 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 11 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:
- Relate the z/OS IPL process to a DB2 subsystem
- Explain effects of stopping and starting DB2
- Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
- The use of DSN command processor running in batch and foreground
- Use views to minimize users’ ability to see into the DB2 catalog
- See how the catalog (through grant activity) controls access to data
- Search the catalog for problem situations
- Use the catalog and DB2 utilities to determine data recovery requirements
- Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
- Implement DB2 and Resource Access Control Facility (RACF) security
- Describe DB2 program flow for all environments
- Display normal and problem threads and database status
- See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
- Interpret lock displays
- Identify and cancel particular threads
- Describe available DB2 utilities to manage system and user page sets
-
This CV853G: Db2 12 for z/OS Introduction to System Administration course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system.
-
This course is for installers of DB2 10 z/OS and/or migration to DB2 11 for z/OS using the Install CLIST. The participants are involved in lectures that explain DB2 11 components and pointers, and the processes used to install or migrate from DB2 10 for z/OS. To reinforce the lectures, a series of labs are provided to give each participant hands-on experience installing DB2 10 for z/OS and migrating to DB2 11 for z/OS.
-
This CV871G: DB2 10 for z/OS Utilities for Database Administrators course is designed to teach you advanced topics about DB2 for z/OS utilities. It is assumed that you attended course DB2 10 for z/OS Database Administration Workshop Part 1 (CV831) so that you already have basic skills about the main utilities. Recovery-oriented topics are not part of this course, so such utility functions are not presented.
-
This course will introduce the student to advanced database administration skills, including program preparation and the use of packages, online schema changes, partition management, and stored procedures; as well as performance and availability features of utilities (including LOAD, REBUILD INDEX, REORG, and UNLOAD). This course does not cover distributed data processing, nor does it cover data sharing.
-
This Application Performance and Tuning course is designed to teach the students how to prevent application performance problems and to improve the performance of existing applications. Students will learn about indexes, table design, locking, and other issues relevant to application performance. This course includes paper exercises and machine exercises designed to reinforce the lecture content.
-
This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.
-
Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.
This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.
Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.
You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.
As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.
Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.
-
The Perl Programming course is a comprehensive course that explains the Perl programming language, from basic through advanced syntax. This course is aimed at a wide range of job roles, including Programmers, System Administrators, Web Authors, and Operators. The course provides the fundamentals needed to use the Perl programming language to write quick yet powerful scripts for a range of purposes, as well as provides an overview of Common Gateway Interface Programming, Object-Oriented Perl and Perl Debugging.
The course is taught on the Oracle Solaris Operating Environment. However, the material is suitable for any operating system, including Linux, UNIX, and Windows.
Learn To:
- Describe the Perl Programming Language.
- Implement Scalars.
- List Control Structures.
- Implement Arrays.
- Describe Hashes.
- Implement Basic I/O and Regular Expressions.
- Describe Subroutines and Modules.
- Manipulate Files and Directories.
- Implement Perl.
Benefits To You
The Perl Programming course provides students with the fundamentals to create functional Perl scripts. The course introduces students to data structures, flow control mechanisms, regular expressions, and subroutines and modules in the form of example scripts and lab scripts. The course concludes with an overview of implementing Perl with regard to Common Gateway Interface (CGI) Programming, Object-Oriented Perl and Perl Debugging. This course however, does not cover the construct of the Perl Programming Language itself or complex Perl functions used for high-level programming. Rather, it focuses mainly on the implementation of the language to create simple and functional Perl scripts.