Warning: Undefined variable $iframe in /home/trainocate/domains/trainocate.sweetmag.dev/public_html/wp-content/themes/AvadaChild/functions.php on line 17

Warning: Undefined variable $iframe in /home/trainocate/domains/trainocate.sweetmag.dev/public_html/wp-content/themes/AvadaChild/functions.php on line 17

Warning: Undefined variable $iframe in /home/trainocate/domains/trainocate.sweetmag.dev/public_html/wp-content/themes/AvadaChild/functions.php on line 17

Warning: Undefined variable $iframe in /home/trainocate/domains/trainocate.sweetmag.dev/public_html/wp-content/themes/AvadaChild/functions.php on line 17

  • 5 Days ILT, VILT

    This course is designed to teach you how to use z/OS Job Control Language (JCL) and selected z/OS utility programs in an online batch environment. Both Storage Management Subsystem (SMS) and non-SMS JCL are discussed. Machine lab exercises complement the lecture material.

  • 5 Days ILT, VILT

    This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.

    You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.

    You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.

  • 3 Days ILT, VILT

    To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.

  • 3 Days ILT, VILT

    Organizations are compelled to find effective and cost-efficient data security solutions.

    Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.

    IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.

    z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:

    • Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
    • New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
    • Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
    • In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
    • In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
    • These exercises reinforce the concepts and technologies being covered in the lectures.
  • 4 Days ILT, VILT

    A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.

    The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 4 Days ILT, VILT

    The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.

    They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.

    lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.

  • 4 Days ILT, VILT

    The Information Architect has mastered the management of information across and within their industry.

    They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.

    Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.

  • 4 Days ILT, VILT

    Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.

    This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.

  • 2 Days ILT, VILT

    This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.

  • 5 Days ILT, VILT

    This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS

  • 3 Days ILT, VILT

    ArchiMate, The Open Group Standard, is an open and independent modeling language for enterprise architecture that is supported by different tool vendors and consulting firms.

    ArchiMate® provides instruments to enable enterprise architects to describe, analyse and visualise the relationships among business domains in an unambiguous way.

    Upon completion, participant can enroll in the following certification exam:

    • ArchiMate 3 Foundation
      The purpose of this certification is to provide validation that the participant has gained knowledge of the notation, terminology, structure and concepts
      of theArchiMate® modeling language. The learning objectives at this level focus on knowledge and comprehension.
    • ArchiMate® 3 Practitioner
      The purpose of this certification is to provide validation that the participant has gained knowledge as in Level 1 and has the capability to use the ArchiMate® language for modeling.
Go to Top