DevOps is an IT trend that rose out of the benefits of integrating development and operations. The main characteristic of DevOps is to use automation and monitoring at several stages of the IT delivery lifecycle. DevOps aims to reduce administrator workload and scale IT resources efficiently to attain business objectives. The course addresses the concepts involved in planning, deploying and implementing Ansible, Chef and Puppet, and shows how to integrate these tools with IBM Cloud PowerVC Manager. You perform basic installation to advanced administrative tasks with these DevOps tools. In addition, the product architectures of these tools, and their benefits are covered while showing how to implement these tools to fit your needs.
-
Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.
-
In this classroom course, you will learn basic concepts and skills you need to be productive users on the IBM i. With plenty of hands-on labs, we show everything from signing to the available user interfaces; green screen environment, System i Navigator and Systems Director Navigator for i. You will learn how objects are managed on the system and how you display these objects. You will learn to use Control Language (CL) commands (fast path) and how to work with and manage messages on the system. We will also address how the system manages work and how you manage your printouts. We will also provide a basic overview of security.
-
This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain in-depth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers.
-
System z continues to extend the value of the mainframe by leveraging robust security solutions to help meet the needs of today’s on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and life cycle management, improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z/OS Intrusion Detection Services. This advanced z/OS security course presents the evolution of the current z/OS security architecture and explores in detail the various technologies involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF), and z/OS Integrated Security Services.
In the hands-on exercises, you begin with your own z/OS HTTP Server in a TCP/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication by using RACF, SSL and the use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services and RACF auto registration. You will also implement different scenarios to implement ssl security for a typical tcpip application; FTP: SSL, TLS, server authentication, client certificates and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures.
-
This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.
-
This course covers the concepts and implementation details of the software-defined networking and storage features of PowerVC on IBM Power Systems servers, known as IBM Cloud PowerVC Manager Software Defined Infrastructure (SDI). Students learn to implement a PowerVM infrastructure with software-defined storage based on IBM Spectrum Scale using NovaLink in SDE-mode, and software-defined networking based on Open vSwitch (OVS). Methods for capturing, deploying, and managing virtual machines in a software defined infrastructure are also explored.
-
This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS
-
DB2 11 for z/OS beginning DBAs can develop fundamental skills or recognition through lectures and hands-on exercises of:
- DB2 Objects
- Structured Query Language
- DB2 Commands
- DB2 Utilities
- DB2 Logging
- DB2 Program Preparation
The course materials cover DB2 11 for z/OS.
-
This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installations storage management requirements.
Hands-on lab exercises enable you to perform a step-by-step implementation.
-
This classroom ES15G: z/OS Facilities course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). It teaches the students the functions of major software base elements in the management of jobs, tasks, storage, data, and problems. It also addresses how these functions can be affected by the system programmer.
Students are introduced to the services provided by the servers which execute in the z/OS environments, such as the Communications Server and the Security Server. Installation packaging options and steps to install the z/OS environments also are introduced.
-
This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.
To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.
Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.
Hands-On Labs
Eight labs are included to address:
- IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
- tuning VSAM and the VSAM buffers
- alternate indexes
-
This course provides participants with a high level overview of the IBM Cognos Analytics suite of products and their underlying architecture. They will examine each component as it relates to an Analytics solution. Participants will be shown a range of resources to provide additional information on each product
-
This LX010G: Linux Basics course is designed to teach the basics of the Linux environment. Class activities include accessing a system, navigating the directory hierarchy, using the vi editor, using common commands, tools, and scripting concepts.
-
The course includes information on the Spectrum Scale installer toolkit, installer GUI, cluster upgrade scenarios, cluster health monitoring, cluster performance data collection and monitoring, management GUI, file system encryption, cluster security, and call home features. Many of the features are described in lecture materials and implemented in lab exercises.
-
This course enables you to acquire the skills necessary to produce application programs that manipulate DB2 databases. Emphasis is on embedding Structured Query Language (SQL) statements and preparing programs for execution.
-
This course presents the structure and control blocks of the z/OS BCP and system services. It prepares the new z/OS system programmer to identify potential bottlenecks and performance problems, perform initial error symptom gathering, and identify opportunities and requirements for tailoring a z/OS system. This course also provides prerequisite information needed for further training in specialized areas such as system measurement and tuning and system problem determination.
-
This CV853G: Db2 12 for z/OS Introduction to System Administration course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system.
-
This course covers the features and functions supported by Backup Recovery and Media Services (BRMS). BRMS is an integrated and comprehensive tool for managing backup, recovery, archive, and retrieval operations for a single Power system with IBM i or multiple systems with IBM i at a site or across a BRMS Network. The lectures describe how to perform the supported functions when using a 5250 emulation session, when using System i Navigator, and when using IBM Navigator for i. Students will then have the opportunity to practice in lab exercises what they have learned in lecture.
-
This classroom course of two days explains how to balance the workload on the IBM i system to ensure optimum performance. Specifically, this course explains how to manage workloads, measure system performance, and tune the operating system to meet processing requirements. Hands-on exercises give you the opportunity to use the system functions that are available for controlling workload and tuning system performance. Evaluation criteria presented in this course are based on the latest information available from IBM development labs.
-
This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:
Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.
Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression
Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.
Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.
Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.
This course lecture offering is at the Storwize V7000 V7.6. level.
-
This course is designed to teach you the basic skills required to write programs using the Rexx language in the standard z/OS environments: TSO, ISPF, and MVS. The course covers the TSO extensions to Rexx, the interface with ISPF, and interaction with other environments such as the MVS console, and running Rexx in batch jobs, and compiling Rexx.
-
This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence or virtualization, the SAN Volume Controller (SVC) to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the SVC into the storage area network. It also explains how to:
- Centralize storage provisioning to host servers from common storage pools.
- Facilitate the coexistence and migration of data from non-virtualized to the virtualized environment.
- Improve storage utilization effectiveness using Thin Provisioning and Real-time Compression.
- Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.
- Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.
-
This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems.
-
This is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.
-
This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.
The course consists of six units and 12 hands-on lab exercises.
-
This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
-
This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.
Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.
Hands-on labs
This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload
-
This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.
-
This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.
-
This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.
-
This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.
-
This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.
-
Validate your expertise and get the leverage you need to move up in your career.
In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.
Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024 | Career Advancement
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The only globally accepted IT risk management certification for professionals with three or more years of experience.
This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.
The artificial intelligence revolution is rewriting the rules of cybersecurity, and the financial stakes are massive. AI-powered cybersecurity will skyrocket from $15 billion in 2021 to a staggering $135 billion by the end of the decade – Artificial Intelligence in Cybersecurity Market Analysis
In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.
The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.







