This course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system.
After completing this course, students should be able to:
Start and stop a Db2 subsystem
Use the SET SYSPARM command
Access the system log to gather information about the subsystem initialization, operation, or shutdown
Describe the components and address space structure of a Db2 subsystem
Explain the use of RACF (or another external security program) for Db2 connection security
Explain the use of Roles and Trusted Contexts
Implement security procredures for a Db2 subsystem
Explain Db2 program flow for all environments
Explain parameter setting for the IRLM
Invoke and utilitze Db2 TSO facilities
Use the Db2 Catalog to monitor subsystem authorizations
Work with the Active Log data sets
Explain Db2 logging
Use SET LOG SUSPEND and SET LOG RESUME
Use DSNJU004 to print log map and interpret the results
Use DSNJU003 to rename Db2 data sets
Plan for recovery of a BSDS failure
Monitor and control a Db2 subsystem
Explain transaction flow in IMS and CICS environments (optional)
Describe the CICS and DB2 environment (optional)
Explain the difference between JDBC and SQLJ
And much more
Who Can Benefit
This course is intended for z/OS system administrators, database administrators, or other technical individuals who will be managing Db2 12 for z/OS.
Understanding of the objects (such as databases, table spaces, tables, indexes, and so forth) used in a Db2 subsystem
Basic knowledge of SQL
At least one year as a z/OS systems programmer or equivalent knowledge
At least one year as a Db2 for z/OS Database Administrator
Starting, stopping, and accessing Db2- Starting Db2 as part of the z/OS IPL process- Data set allocation and APF authorization- The START DB2 and STOP DB2 commands- zParms, DSNTIJUZ, and DSNZPARM- Address spaces- IRLM and lock storageDb2 components and processes- BSDS and logging- Catalog and directory- Program preparation and execution- Transaction execution- Data sharing in the sysplexSystem security- Protecting Db2 data sets- Controlling connections to Db2- Db2 authorization exits- Trusted context and roles- Securing an application serverDb2 authorization- Authorizations- Controlling access for dynamic and static SQL- Access control authorization exits- Distributed securityProgram flow for all environments- Connection types and language interfaces- Program flowTSO and batch environments- TSO- UtilitiesTransaction flow in IMS and CICS (optional)- Transaction processing- Thread reuse- SIGNON exitCICS - Db2 environment (optional)- CICS connections to Db2- DSNC transactionIMS - Db2 environment (optional)- IMS-Db2 introduction- IMS TM- IMS/DLI batch environmentDistributed - Db2 environment- Distributed attachment- Location aliases- DDF profiling- Block fetch- Db2 REST servicesLogging- The Db2 log- Log commands- Archiving considerations- BSDSDb2 utilities- Categorization- DSNJU003 and DSNJU004- BACKUP and RESTORE SYSTEMOperations (monitoring and controlling Db2)- Issuing Db2 commands- Basic workload controls- Monitoring and controlling utilities- DISPLAY commands- Starting / stopping databasesRecovery- Planning for recovery- Table space recovery- Log considerations- DISPLAY and SET LOG commands- Recovery considerationsSystem recover/restart- System checkpoints- System restart after normal shutdown- Page externalization- Two-phase commit processing- System restart after system failure- Recovery considerationsJava with Db2 (optional)- JavaAdministrative task scheduler (optional)- Overview- Routines- Scheduling features- Life cycle- Syncronization- Commands
Classes begin promptly at 9:00 am, and typically end at 5:00 pm.
Does the course schedule include a Lunchbreak?
Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.
How can someone reach me during class?
If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.
What languages are used to deliver training?
Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.
What does GTR stand for?
GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.
Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.
What does vendor-authorized training mean?
As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.
Is the training too basic, or will you go deep into technology?
It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.
How up-to-date are your courses and support materials?
We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.
Are your instructors seasoned trainers who have deep knowledge of the training topic?
ExitCertified instructors have an average of 27 years of practical IT experience. They have also served as consultants for an average of 15 years. To stay up to date, instructors will at least spend 25 percent of their time learning new emerging technologies and courses.
Do you provide hands-on training and exercises in an actual lab environment?
Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.
Will you customize the training for our company’s specific needs and goals?
We will work with you to identify training needs and areas of growth. We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.
How do I get started with certification?
Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact firstname.lastname@example.org.
Will I get access to content after I complete a course?
You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.
had a good time with the course, however some topics were left out due to the compact amount of time for training.
Very interactive and in-depth course that really got me ready for the industry
Topics, material and specially instructor (Graham Godfrey) was beyond my expectations.
it was good and very informative. Instructure covered everything in detail.
Labs and the study materials provided for Architecting on AWS course are very easy to understand and explains all the topics required to pass the Associate certification.