Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.
-
In this classroom course, you will learn basic concepts and skills you need to be productive users on the IBM i. With plenty of hands-on labs, we show everything from signing to the available user interfaces; green screen environment, System i Navigator and Systems Director Navigator for i. You will learn how objects are managed on the system and how you display these objects. You will learn to use Control Language (CL) commands (fast path) and how to work with and manage messages on the system. We will also address how the system manages work and how you manage your printouts. We will also provide a basic overview of security.
-
This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain in-depth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers.
-
This is the follow on course to AS24G. This course teaches advanced operator skills. OL19G may also interest this student.
This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC. We will discuss the IBM i Access Family of products in general and Access Client Solutions, specifically. We will discuss the different types of security that you can implement in order to control who has access to your data and what they can do with that data if they are allowed to access. We will discuss security control via system values, user and group profiles, authorization lists, and adopted authority. This course will help you develop additional skills in the areas of work management and how to create a basic CL program. In the area of CL programming, we discuss concepts of programming, then how to create a basic CL program using the traditional application development tools PDM and SEU. Then, you will learn how to use the GUI tools in RDP (RSE and LPEX). You will also learn the steps to create a menu using SDA. You will learn some tips that you can use to help improve your IBM i operations. We will also discuss how you can use Management Central as a tool to manage a single system or a network of TCP/IP connected Power Systems with IBM i.
-
This course will help you to better understand the techniques of performance analysis and capacity planning on systems and partitions running IBM i and develop an appreciation of how IBM i operates and interfaces with applications. This course is expected to build skills to better manage performance and capacity on systems and partitions running IBM i.
The course explains IBM i concepts, including the Technology Independent Machine Interface (TIMI), main storage pools, auxiliary storage pools, management of jobs, threads, and tasks, job run-time structure, performance monitoring, data collection, and analysis of performance data.
This course includes hands-on activities using performance data from IBM i systems to help the student appreciate the concepts discussed. This course is designed for those running Power Systems on IBM i. While it includes i 7.2 content, it is suitable for those currently using prior versions of IBM i.
The first part of this course (units 1-6) focus on teaching the performance management process, the performance considerations of key hardware components and virtualization options, and tuning options to help optimize performance. During these lectures, students should gain an appreciation of the unique storage management and work management components in the IBM i architecture and how these components need to be managed for optimal performance.
The second part of this course focuses on the tools and techniques to monitor, analyze, and plan for performance of Power Systems with IBM i and Logical partitions (LPARs).
The primary analysis tool that will be used is the Performance Data Investigator (PDI) which is included with IBM Navigator for i. PDI is also used with IBM Systems Workload Estimator (WLE) for capacity planning activities.
-
This course is designed to teach you how to use z/OS Job Control Language (JCL) and selected z/OS utility programs in an online batch environment. Both Storage Management Subsystem (SMS) and non-SMS JCL are discussed. Machine lab exercises complement the lecture material.
-
Learn to explore, summarize and interpret data like a pro.
This 0G51BG: Statistical Analysis Using IBM SPSS Statistics v26 course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships.
Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results.
-
This course will introduce the student to advanced database administration skills, including program preparation and the use of packages, online schema changes, partition management, and stored procedures; as well as performance and availability features of utilities (including LOAD, REBUILD INDEX, REORG, and UNLOAD). This course does not cover distributed data processing, nor does it cover data sharing.
-
Learn to write easy to use and efficient control language (CL) programs which may be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input).
You will learn to write Control Language (CL) programs which may be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input).
-
To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.
-
This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.
You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.
You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.
-
Organizations are compelled to find effective and cost-efficient data security solutions.
Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.
IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.
z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:
- Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
- New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
- Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
- In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
- In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
- These exercises reinforce the concepts and technologies being covered in the lectures.





