BMC - Interskill Learning Mainframe Training

[email protected]

The World’s Most Delivered Mainframe Training
Search   Course Catalog  

Course Catalog

Detailed description of all courses and videos by curriculum. We recommend you follow the Learning Plan for your mainframe job role, or the course requirements for your desired IBM Digital Badge, but please note that courses can be taken at any time, in any order and unlimited times within your license period.


Please click on any topic below and explore the Course content covered.

  »  Assembler
Course Title Duration
(Hours)
Description
Assembler Introduction
5 The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability.
Assembler Instructions
7 The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed.
Assembler Macros
5 The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use.
Assembler Programming
8 The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings.
Assembler z/OS Advanced
5 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
Assembler Cross Memory Services
4 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
  »  Blockchain
Course Title Duration Description
Blockchain Technologies
4 The Blockchain Technologies course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network.
Course Title Duration Description
CONTROL-M Series
Introduction to CONTROL-M for z/OS 3 The Introduction to Control-M for z/OS course begins by describing the need for workload scheduling, introducing BMC Control-M for z/OS and describing its general function. It then looks at how this product is accessed using a traditional 3270 interface, as well as the Control-M EM GUI.
Defining and Scheduling Jobs Using Control-M for z/OS 4 The Defining and Scheduling Jobs Using Control-M for z/OS course works through the process of creating definitions used to schedule jobs. It begins by introducing the concept of calendars, and describing how various types of calendars can be created. It then jumps to the actual job definition, describing how it can be used to provide diverse scheduling requirements. Automated actions performed following job completion are also discussed. The final module delves into the use of system and user-defined variables and describes how they can be used to dynamically modify JCL submitted from a Control-M job definition.
Monitoring and Managing Job Processing 4 The Monitoring and Managing Job Processing course describes how jobs are monitored using the Active Environment screen, looking at job statuses and commands used to manipulate jobs. It then turns to the monitoring and management of other Control-M components, including the log, conditions, and control and quantitative resources. In the final module, an overview of the utilities that run automatically, and those that can be invoked manually, are discussed, as well as the types of reports that can be run, are covered.
MainView Series
Mainview - Overview of the MainView Environment 1 This course introduces you to the architecture common to MainView products, discussing the function of several address spaces, and the Next Generation Logger. Following this, the MainView 3270 interface is examined, looking at its structure and commands that can be used to manipulate the screen content. Details describing how historical data is accessed is also provided.
MainView - Advanced MainView Screen Functionality 1 This course examines advanced MainView screen functionality such as hyperlinks and EZ Menus, which are used to quickly navigate between related MainView screens. Filtering and customization of screen data is covered in detail, highlighting options that can be used to more clearly identify specific data.
  »  C Programming
Course Title Duration
(Hours)
Description
C/C++ on z/OS for C Programmers 1 This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment.
  »  CICS v5.6
Course Title Duration Description
CICS Transaction Server Operations 5.6 Series
CICS TS - CICS Transaction Server Introduction 5.6
4 The CICS TS - CICS Transaction Server Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated.
CICS TS - CICS Explorer Fundamentals 5.6
3 This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered.
CICS TS - Controlling CICS Transaction Server Operations 5.6
6 The CICS TS - Controlling CICS Transaction Server Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems.
CICS TS - CICS Command Simulation 5.6
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS.
CICS Transaction Server Programmers 5.6 Series
CICS TS - Programming Basics 5.6
6 The CICS TS - CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product.
CICS TS - Program Control and Communication 5.6
6 The CICS TS - Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas.
CICS TS - Files and Databases 5.6
4 This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2.
CICS TS - Storage and Transient Data 5.6
4 This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues.
CICS TS - Programming for Web Access 5.6
4 This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them.
CICS TS - Using CICS Transaction Gateway 5.6
3 This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS.
CICS TS - Terminal Communications 5.6
6 The CICS TS - CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment.
CICS TS - Using SDF II to Maintain CICS TS Maps 5.6
2 This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps.
CICS TS - Programming for Recovery 5.6
3 This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery.
CICS TS - Debugging CICS Programs 5.6
4 The CICS TS - Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces.
  »  Coaching and Mentoring for Technical Specialists
Course Title Duration Description
Coaching and Mentoring for Technical Specialists
2 The Coaching and Mentoring for Technical Specialists course begins by explaining how learning has evolved from the traditional on-the-job and classroom training, to a myriad of learning resources to suit a wide range of people. Coaching and mentoring are introduced, describing how they differ and the benefits they can provide. These items are then discussed in more detail outlining various coaching and mentoring models, and how they can be implemented and managed. Several scenarios involving technical coaching and mentoring are presented, allowing you to relate to how these types of programs can run in your environment.
Course Title Duration Description
CLIST – Basics 3 The CLIST Basics course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS..
CLIST – Advanced CLIST Coding 4 This course exposes the learner to more advanced CLIST functions available for developing executable CLISTs. Topics cover aspects such as control variables, built-in functions as well as defining CLIST options and using error and attention exits.
CLIST – Performing I/O with CLIST
1 This course focuses on using CLISTs for the purpose of reading and interpreting data entered from the terminal. Also discussed are how CLIST can be used to read and write data to and from data sets.
  »  Cloud Computing
Course Title Duration Description
Introduction to Cloud Computing
3 This course provides an overview of cloud computing concepts including key characteristics, cloud services, and cloud deployment models. It discusses the mainframe’s role in cloud computing and then looks at the future developments around cloud computing.
Understanding Cloud Architecture
3 This course looks at cloud architecture and what technologies and methods are utilized to develop and deploy modern cloud applications.
Cloud Security
1 This course provides an overview of the security measures that need to be considered when implementing an organization’s cloud environment. It discusses the importance of security and compliance, and highlights some of the tools and security mechanisms that can help ensure an organization’s data integrity and security is maintained.
Cloud Governance
1 For organizations to successfully transition their business to the cloud they should consider strategies that will minimize associated risks. This course introduces concepts around what cloud adoption and cloud governance is and what strategies and processes are needed to ensure a business utilizes tools to aid it in a successful transition to the cloud.
  »  COBOL Programming
Course Title Duration Description
COBOL Programming - Basics
6 The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions.
Data and Datafile Definitions in COBOL
4 The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways.
COBOL Programming – Manipulating Data
6 The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index.
COBOL Programming - Advanced
5 The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program.
COBOL - IBM Enterprise COBOL 6.3 for z/OS
4 The COBOL - IBM Enterprise COBOL 6.3 for z/OS course is designed for learners with a basic understanding of generic COBOL who need to extend its use to the z/OS environment. It describes how COBOL programs are made available through compile and bind processes and discusses coding and options specific to the z/OS environment. The use of IBM's Language Environment is presented, and a number of coding techniques used to improve the performance of COBOL running on z/OS, is also shown.
Accessing IMS Databases from COBOL
3 The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained.
  »  Containers Curriculum
Course Title Duration Description
zCX – Container Extensions for z/OS
1 The content of this course offers an introduction to the Docker platform and how z/OS Container Extensions (zCX) facilitates the running of Docker containers on z/OS. It includes an overview of the Docker images that are compatible with zCX and describes where they can be obtained. The course also explores various practical use cases that illustrate the benefits of implementing zCX. Additionally, the course provides detailed information on zCX, explaining how the zCX started task provides the infrastructure that Docker containers need to run, and how it leverages z/OS features.
Containers – Introduction to Containers, Docker, and Kubernetes
1 In this course, you will see how containers allow applications to be packaged with prerequisite software and tools for easier deployment. You will also learn how Docker enables developers to easily pack, ship, and run these containers, and how tools such as Kubernetes assists in managing them.
  »  Cryptography Curriculum
Course Title Duration Description
Cryptography - Pervasive Encryption z/OS 2.5
1 This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption is today, a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z16 infrastructure are provided, describing how at-rest, and in-flight data associated with those components supports new and existing encryption capabilities.
Implementing Pervasive Encryption on z/OS – Expert Videos
Expert Videos
1 This expert video series introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. Finally, some best practice for determining which data you should encrypt is presented.
  »  Data Analysis, Analytics, and Machine Learning Curriculum
Course Title Duration Description
Big Data, Hadoop, and Analytics
4 This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organizations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data.
Machine Learning and Spark 4 This course is designed for those working with organizations looking to implement Machine Learning solutions. It is also of benefit for those looking to implement Spark on z/OS. It begins by explaining what Machine Learning is, how it works, and how organizations can benefit from it. The course then focuses on IBM's Machine Learning for z/OS solution, describing its features and components. In the final course, a description of Apache Spark and how it is used in a Machine Learning solution on a z/OS system, is presented.
  »  Databases Curriculum
Course Title Duration Description
Coding Db2 Applications for Performance Expert Videos Series

Db2 Coding - Defining Database Performance - Expert Videos
.5 In these expert videos, a breakdown of what constitutes performance in relation to Db2 applications is discussed. The presenter begins with a high-level view of performance, and the factors to be considered when coding, and managing Db2 applications.
Db2 Coding - Coding Relationally - Expert Videos
.5 These expert videos delve deeper into the relational aspect of Db2 databases, explaining how it impacts the way applications are coded. The presenter discusses traditional data processing techniques and describes how this process differs when coding for Db2 databases. A range of coding tips are presented that will improve the performance of your Db2 applications.
Databases Series

Databases – Introduction to Databases and Database Managers
4 This course provides you with a core understanding of the need for databases, the way they are structured, and the type of information they can hold. It describes the types of database models that you are likely to encounter and describes their pros and cons. The use of a Database Management System (DBMS) is discussed, providing examples of functionality and features that are often employed by users of it. Finally, you will see how a database is defined and configured, along with the types of tasks that need to be performed as part of this process.
Databases Introduction to SQL
4 This course begins by providing you with an overview of SQL functionality, and describes how SQL is used to obtain data from a database table. Once data has been obtained there are many scalar and aggregate functions that can be used for purposes such as creating a subset of that data, or manipulating the data itself into another format. This is discussed in detail. Finally, you will see how data can be added to a database, and how it can be modified, and deleted.
Databases – Advanced SQL
4 This course provides you with more in-depth uses of SQL. It begins by examining how data from multiple tables can be joined together, and how different types of JOIN statements can be used to achieve your goal. You will also see how specific data can be selected from tables and how conditional operations can be invoked based on data values. The merging of results from multiple SELECT statements is also presented. Finally, you will see how a SELECT query can exist within another SELECT statement. These are called subqueries.
Databases – Database Manager Resources
4 This course starts by providing you with the methods used to create a database and its components. It then introduces you to the commands used to alter database component attributes and shows you how to remove data. You will see how commonly used instructions can be saved as a stored procedure, and the benefits they provide. You will then look at user-defined functions (UDFs), how they are created, and how they differ from stored procedures. Finally, you will be presented with various methods for securing your database.
Databases – Database Communication
4 This course describes how local and remote clients can connect to a DBMS server. It discusses connection options including the use of APIs. You will also see how an administrator can view existing client connections and configure the DBMS to place restrictions on client activity. Finally, you will see how replication provide copies of database systems on alternate DBMS servers. This is useful for redundancy purposes.
Db2 v13 Operations Series

Db2 13 – Db2 Fundamentals
5 The Db2 13 – Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI.
Db2 13 – Managing Db2 Operations on z/OS
4 The Db2 13 – Managing Db2 Operations on z/OS course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart. You will be introduced to Db2 stored procedures on z/OS, and see how they are created and managed.
Db2 v13 Series
Db2 13 – Introduction to Db2
4 The Introducing Db2 course discusses the platforms on which Db2 can be implemented, and the core features that can be found with all Db2 versions. You will look at common Db2 components and see how they are used to store and manage Db2 data. An overview of IBM Data Studio is also presented, explaining how it is used to work with relational database management systems such as Db2.
Db2 13 – Creating and Maintaining Db2 Programs
5 The Create and Maintain Db2 Programs course describes how SQL can be invoked from an application program and the interaction that can occur between the application program and Db2. Measuring the success of the SQL is then discussed, and the use of SQLCA, and SQLSTATE to determine this. You will then see how cursors can be used to reference table data, and finally how Db2 data is saved and recovered using commits and rollbacks.
Db2 13 – Building Db2 COBOL Programs
3 This course discusses the steps required to create Db2 COBOL programs.
Db2 13 – Optimizing Db2 Application Performance
5 The Db2 13 – Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyze their effectiveness.
  »  Data Center Storage Management 2.5
Course Title Duration(Hours) Description
Storage - Introduction to Storage and Disk Systems 2.5
3 This course describes how data center storage has evolved and its future in this environment. It then focuses on the hardware and software that comprises today's disk systems and how this meets the need of the data center.
Storage - Understanding Tape Storage 2.5
3 This course discusses how tape usage in data centers has evolved and looks at the purpose of this medium in today's environment. An overview of tape storage capabilities is discussed before looking at the emergence of virtual tape and how it is either replacing traditional tape systems, or working with them, to meet the data storage demands of the enterprise.
Storage - Networks, Administration, and DASD Management Using ICKDSF 2.5
4 This course provides an overview of network storage configurations and the monitoring and management tasks associated with the Storage Administrator role are also discussed.
Storage - Managing z/OS Data Using DFSMS Constructs 2.5
5 This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment.
Storage - Storage and Tape Administration Using DFSMShsm and DFSMSrmm 2.5
3 Initial content discusses space administration needs looking at data center backup and migration requirements, and then showing how this is achieved using DFSMShsm. The management of tape volumes and labels using DFSMSrmm is also covered in detail.
  »  DevOps and Agile
Course Title Duration Description
DevOps - Introduction to DevOps in the Workplace
5 The DevOps - Introduction to DevOps in the Workplace course begins by discussing traditional software development and deployment, and how DevOps can be used to improve this process. A holistic view of DevOps is broken down to its core components describing the people and processes involved with each phase. The continuous DevOps integration, delivery, and deployment phases are explained along with common release management deployment techniques. An overview of the types of monitoring and reporting required to measure the effectiveness of DevOps practices is also provided showing how it feeds back into the DevOps cycle.
Agile Fundamentals
1 The Agile Fundamentals course discusses the business value of adopting an Agile philosophy, introducing a real-life software development project, and describing how Agile is used to restructure traditional software development and deployment tasks. The values and principles associated with the Manifesto for Agile Software Development are explained, while an overview of common frameworks used to adopt Agile philosophes is provided, along with their benefits. Additional Agile training, accreditation, and related supported products and practices are also mentioned throughout the course.
  »  Disaster Recovery
Course Title Duration Description Description
DR – Ensuring Data Center Business Continuity
3 BM Ensuring Data Center Business Continuity. This course is suitable for any staff requiring a broad understanding of an organization's requirements when it comes to Business Continuity and Disaster Recovery.
DR – Data Center Disaster Recovery Planning
5 Initial content is management-focused, covering the role of individuals and groups responsible for creating, modifying, and testing the organization’s Business Continuity Disaster Recovery (BCDR) program. It explains broadly the tasks that need to be performed and the consequences should they fail.
DR – Data Center Backup and Recovery Strategies
5 Initial content focuses on the importance for organizations to properly protecting their digital assets from data loss and data corruption. An overview of common data center backup strategies and methods is provided along with details on how encryption is used to safeguard backups. The benefits of using Geographically Dispersed Parallel Sysplex (GDPS) technologies is presented and the various configurations available with this solution are covered in detail. Cloud based facilities such as Disaster Recovery-as-a-Service (DRaaS), and Backup-as-a-Service (BaaS), are discussed, describing the benefits and challenges of each.
  »  Hardware Management Console
Course Title Duration Description
HMC – Familiarization and Operation 2.16
3 This course introduces the student to the hardware management console (HMC) describing its function and importance in managing the IBM Z mainframe hardware. It describes how the HMC can be accessed, and job roles that can be configured for use. The HMC logon procedure is discussed, highlighting important information that is presented during this process. This is followed by an overview and familiarization of the HMC interface, and details on navigation techniques, and customization features. Finally, you will be introduced to a number of tasks that can be performed from the HMC, beginning with those most commonly performed and progressing to more advanced use. General information on using the HMC mobile app is also presented, covering implementation, customization, and operation of this tool.
  »  IBM Developer for z/OS
Course Title Duration Description
IDz – IBM Developer for z/OS Basics
4 This course introduces the programmer to the IBM Developer for z/OS (IDz) product describing its purpose and features, how it is installed, and access to resources on a host system.
IDz – Creating and Managing Applications Using IDz
4 This course describes the methods used to create, manage and maintain applications under IDz. It provides details on the benefits of projects and subprojects within IDz and the application tasks that can be performed within this structure. IDz testing and debugging capabilities are discussed in detail, in particular the ZUnit testing framework, and the IBM z/OS Debugger. The final module addresses the IDz features that allow you to create applications for Db2, CICS, and IMS.
  »  IBM Explorer for z/OS 3.2
Course Title Duration Description
z/OS Explorer - IBM Explorer for z/OS
2 The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of the Remote System Explorer (RSE), z/OS and Resource perspectives, and the related views used to display and manage z/OS data.
  »  IBM LinuxONE Curriculum
Course Title Duration Description
LinuxONE – Introduction to LinuxONE 4
3 In this course, you will see how IBM has addressed evolving IT trends and embraced Linux, surrounding it with enterprise standard hardware and software. You will delve inside different LinuxONE servers and look more closely at how they are structured and how they can be configured. You will also see technical improvements from previous LinuxONE models and how the LinuxONE Emperor 4 LA1 compares to the z16, the entry-level LinuxONE Rockhopper 4 LA2, and the LinuxONE Rockhopper 4 Rack Mount Bundle.
  »  IBM Mainframe Communications 2.5
Course Title Duration Description
Comms – IBM Mainframe Communications Concepts 2.5
1 This course offers an overview of essential networking principles and introduces you to mainframe networking concepts, explaining how it has evolved.
Comms – Monitoring and Controlling VTAM 2.5
3 This course covers aspects around using VTAM commands to monitor and control various VTAM resources. Initially introducing VTAM display commands to check network status, and to diagnose and solve network issues, and later introducing how to use action commands to control the VTAM network and resolve problems.
Comms – Monitoring and Controlling TCP/IP 2.5
4 This course covers the fundamentals of TCP/IP, including its diverse features and functions. It also provides details on initiating and terminating TCP/IP, along with an introduction to a range of commands for monitoring and managing both TCP/IP client and server applications.
Comms – VTAM Command Simulations 2.5
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM.
  »  IBM Mainframe Performance and Capacity Management for z/OS 2.5
Course Title Duration Description
Z Performance - Introduction to Mainframe Performance for z/OS 2.5
3 The Introduction to Mainframe Performance course provides the learner with a core understanding of what performance measures are required when managing a mainframe environment. Measuring the usage of critical resources is discussed, and potential issues that can affect the performance of tasks running in a z/OS system are presented.
Z Performance - z/OS I/O Performance and Capacity Planning for z/OS 2.5
3 In this course you will examine the I/O process and see how I/O performance problems are detected, and the metrics used to determine where a problem may exist. Methods used to improve I/O performance are also discussed. Following this, an introduction to z/OS capacity planning is presented, describing the data required to identify future system growth and tips that can be used to better utilize existing resources before considering hardware or software purchases.
Z Performance - z/OS Performance Tools and Software Pricing for z/OS 2.5
2 In this course you will discover how SMF is used to capture important system activity and store it as specific record types. You will see how these records are structured and the utilities used to convert their content into a readable format. Commands used to display, configure and manipulate SMF are covered, as well as the process of archiving SMF records and creating your own SMF records. Following this, an introduction to software licensing is presented, describing common licensing models and the metrics they use to determine the cost to the customer. This information will assist the user in determining ways to minimize software licensing costs.
Z Performance - z/OS Workload Manager for z/OS 2.5
3 The Z Performance - z/OS Workload Manager course provides the learner with steps describing how WLM components are created and linked, to form a WLM policy. The course then progresses to discussing in detail various workloads and the goals and importance that should be assigned to them. This is followed by an overview of performance information that can be obtained through SMF records, MVS commands, and SDSF.
  »  IBM MQ
Course Title Duration Description
IBM MQ - Introduction to IBM MQ
4 This course provides the learner with basic information about IBM MQ, initially describing how it is used and then branching out discussing its features. A detailed breakdown on IBM MQ components and their structure are provided, providing you with an overview on how it could be configured in your environment. Finally, the use of IBM MQ in a z/OS environment is covered with details on how it differs from other platforms.
IBM MQ - MQ Operations and Administration
6 This course begins by describing IBM MQ, and its common deployment options, and then is expanded to show how an IBM MQ queue manager is created. Various commands used to interact with MQ components are discussed throughout the remaining content, showing how definitions are created and displayed, and modifications that can be made to them. A focus on the security of MQ resources and authentication required to access them, is also presented.
IBM MQ - MQ Operations and Administration for z/OS
4 This course looks at the differences between traditional MQ, and how it is implemented and run in a z/OS environment. It discusses the use of z/OS datasets and files that need to be created as well as the procedures used to enable MQ in z/OS. You will see how traditional MQ commands map to z/OS, and how MQ resources are managed using z/OS online facilities and batch utilities. Security for MQ resources on z/OS is examined along with tools and utilities used for monitoring aspects of MQ performance.
IBM MQ - MQ for Application Programmers
4 This course begins by identifying the basic programming code used by applications to interact with IBM MQ. It describes the MQ messaging process and then delves more heavily into the commands that can be used to get and put MQ messages, and manage MQ objects. Details on programming with MQ in a z/OS environment is provided, explaining core differences when using that platform.
  »  IBM Z Mainframe Hardware
Course Title Duration Description
IBM Z – Introduction to the IBM Z Systems
1 This course describes how IBM Z hardware has evolved to cater for today’s enterprise data processing needs.
IBM Z – Hardware Models – z16
3 This course introduces the IBM z16 mainframe server, describing its capabilities and new features. It then focuses on the key z16 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z15
2 This course introduces the IBM z15 mainframe server, describing its capabilities and new features. It then focuses on the key z15 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z14
2 This course introduces the IBM z14 mainframe server, describing its capabilities and new features. It then focuses on the key z14 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z13
2 This course introduces the IBM z13 mainframe server, describing its capabilities and new features. It then focuses on the key z14 hardware components and the I/O structure used to transport data through the system.
  »  IBM Z System Automation Curriculum
Course Title Duration Description
SA z/OS - Introduction to IBM Z System Automation
1 The Introduction to IBM Z System Automation course provides the learner with a basic understanding of what IBM Z System Automation is and how it can be used in today’s modern enterprise. The course begins with looking at some of the benefits the product provides in managing system resources through automation. The course also covers the various components that enable automation functionality. Finally, the course delves further into what tools are available for IT personnel to interact with use with IBM Z System Automation.
SA z/OS - IBM System Automation: Planning, Installation, and Customization
3 The SA z/OS - IBM System Automation: Planning, Installation, and Customization course, takes the user through the steps required to install, and configure SA z/OS V4.2 onto their system. Initial content covers implementation considerations, and provides the learner with tools used in the planning and installation process. The configuration assistant section describes how some of these implementation tasks can be automated. The Customization Dialog module describes how this product is used to build an SA z/OS automation policy database. It guides the learner through the creation of database entries, to the compilation of the Systems Operations Configuration File, enabling it for distribution and use by an automated system.
SA z/OS – IBM System Automation: Operations
3 The SA z/OS - IBM System Automation: Operations course, focuses on the SA z/OS administration and monitoring tasks performed by operations and administrator personnel. Initial content looks at initializing SA z/OS, and describes start-up options that can be invoked for the automation manager and automation agent. Tasks that allow you to refresh automation configuration data, and enable automation through the use of automation flags, pacing gates and runmodes is also discussed. SA z/OS functionality that may unintentionally inhibit automation activity, and how these issues are resolved is also covered.
SA z/OS - Automation Definitions Introduction and Workshop
3 The SA z/OS - Automation Definitions Introduction and Workshop course, begins by describing the key Entry Types that can be defined in an SA z/OS policy database, and their purpose. Following this, a workshop-style module provides you with hands-on exercises used to create an application, application group and related automation definitions.
SA z/OS - Advanced Automation and Reporting
4 The SA z/OS - Advanced Automation and Reporting course, introduces the learner to some more advanced implementation and configuration possibilities focusing on end-to-end automation, and the automation of CICS, IMS, and Db2 environments. It also looks at various methods used to report on the policy database content, automation activity, and statistics produced by SMF relating to automation usage.
  »  IMS (Information Management System)
Course Title Duration Description
IMS v15 Series
IMS 15 Introduction
5 The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts.
IMS 15 Commands
4 The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided.
IMS 15 Databases
4 The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations.
IMS 15 Transaction Manager for Programmers
4 This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use.
  »  Introduction to the IBM Environment 2.5
Course Title Duration
(hours)
Description
Sys Prog – Tips to Advance Your Systems Programmer Career – Expert Videos
.7 In this set of expert videos, Meral Temel presents a list of practical tips that will help you become a more successful Systems Programmer. She emphasizes that learning is something that never stops and that Systems Programmers today need to accept that they cannot know everything and to target smaller areas of learning, and to look at the big picture of work they are performing. She discusses the importance of note taking, creating to-do and to-learn lists, and planning, as well as providing ideas on how best to address troubleshooting. Finally, Meral discusses how learning about performance-related aspects of the mainframe will stand you in good stead as it is woven into almost every Systems Programmer task.
IBM (z/OS) – The Evolving Mainframe 2.5
3 This course describes what a mainframe is, how it has survived, and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components that you will find in a typical mainframe environment.
IBM (z/OS) – Working with the Mainframe 2.5
3 This course begins by explaining how data is stored in a mainframe and the type of security that protects it. It then discusses the core products used to prioritize and process that data. Locating system documentation is going to be important for anyone working on the mainframe, for example error message manuals, product installation processes, so knowing how to access it is important. This is covered in the last module of this course.
IBM (z/OS) – z/OS Systems Programming Basics 2.5
4 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, and the system data sets and parameters that are used to initialize and configure the z/OS system.
IBM (z/OS) – z/OS System Initialization & Configuration for Sys Progs 2.5
3 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization, and JES2 configuration. and how system data sets and parameters can be modified in response to system issues.
IBM (z/OS) – Application Programming Basics 2.5
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data.
IBM (z/OS) – Application Programming Environment Overview 2.5
6 This course discusses widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST, Java, and Python, and describes how the Language Environment provides many of these languages with common runtime routines.
  »  Java Programming
Course Title Duration Description
Java on z/OS for Java Programmers
1 This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere.
Java Introduction for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment.
Java Programming for the IBM Enterprise
7 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent.
Java Data Access for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems.
  »  JCL 2.5 (Job Control Language)
Course Title Duration
(hours)
Description
JCL (z/OS) - Introduction to JCL 2.5
3 The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.
JCL (z/OS) – JCL Coding Basics – JOB and EXEC Statements 2.5
4 This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.
JCL (z/OS) – JCL Coding Basics – DD Statements and Data Sets 2.5
4 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones.
JCL (z/OS) – JCL Coding Basics – DD Statements and SYSOUT 2.5
3 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course looks at the coding for printed output and job SYSOUT.
JCL (z/OS) – Advanced JCL Data Set Use 2.5
5 The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.
JCL (z/OS) – Controlling Job and Step Processing 2.5
3 While JCL is generally rigid in the way that it runs programs and related jobs, in recent years there have been several advancements in code that can be used to conditionally run steps, and schedule jobs. This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.
JCL (z/OS) – Working with Procedures and Symbols 2.5
3 Previous courses have described many of the statements and parameters to build a basic job. This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.
JCL (z/OS) – Running and Debugging JCL 2.5
3 In previous JCL courses you have been presented with many examples of the types of errors that can be produced when running your JCL. This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.
JCL (z/OS) – Advanced – Tips and Tricks 2.5
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with various z/OS releases, and provides details on statements and parameters that have evolved over the last few years.
  »  JES 2.5 (Job Entry Subsystem)
Course Title Duration Description
JES2 – Basics 2.5
3 This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology.
JES2 – Understanding JES2 Processing 2.5
4 This course describes how JES2 devices are used, their possible statuses, and how batch jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes.
JES2 – Using JES2 Commands 2.5
3 This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status.
JES2 – Monitoring Jobs, Initiators, and Printers Using JES2 Commands 2.5
3 This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status.
JES2 – Managing Batch Processing in a JES2 Environment 2.5
5 This course builds from previous training, describing commonly used JES2 commands used to manage and schedule batch job activity. It also introduces JES2 networking capabilities, describing how batch jobs can be scheduled for processing on other mainframe sites within the organization.
JES2 – Controlling JES2 Initiators and Printers 2.5
3 This course discusses the manipulation of JES2 initiator and printer resources that are associated with job, and job output, processing.
JES2 – Resolving Network and Spool Space Problems 2.5
3 This course provides you with examples of common JES2 batch job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues.
JES2 – Managing JES2 Checkpoints 2.5
4 This course provides detailed information relating to the function and use of JES2 checkpoints; their placement, and attributes, along with steps required to resolve problems associated with this resource.
JES2 – Identifying and Resolving JES2 System Problems 2.5
5 This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully.
JES2 – Advanced – Tips and Tricks 2.5
.5 This course contains many JES2-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent z/OS releases.
JES2 – Command Simulations 2.5
.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources.
Course Title Duration Description
Introduction to Linux
5 The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed.
The Linux File System
5 The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed.
Editing with VI
4 The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided.
Linux Shell Programming
4 The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors.
Linux Operations
4 The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization.
Linux on IBM Z Fundamentals
5 The Linux on IBM Z Fundamentals course discusses available Linux distributions for the IBM Z environment, its operational implementation, and the general monitoring and management of Linux. The final module provides an overview of the performance monitoring and management tasks performed by the Linux Administrator, and contains tips for best practice in these areas.
  »  Mainframe Application Performance Curriculum
Course Title Duration
(Hours)
Description
Introduction to Sampling Performance Tools 1 This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions.
Mainframe Application Performance Tuning 1 A general introduction to mainframe application performance. In this course, you will be introduced to the basic concepts of improving application performance by tuning. This course includes suggestions on when and why to tune, tuning for CPU vs service time, and also considers batch and online performance objectives.
  »  Managed File Transfer Curriculum
Course Title Duration
(Hours)
Description
Managed File Transfer for Operations
3 This course describes how file transfer requirements have grown in importance over the years to the point where it has become an integral part of the daily workload processing. It then focuses on the elements of file transfer covering security aspects such as encryption and hashing algorithms as well as discussing the pros and cons of popular file transfer protocols. This knowledge is paramount when needing to manage and monitor a file transfer environment. The final part of this course discusses the common features associated with general Managed File Transfer (MFT) products, looking at tasks that need to be undertaken to ensure that compliance, internal regulations and SLAs are met, and that data integrity and security is maintained.
  »  Parallel Sysplex Curriculum 2.5
Course Title Duration
(Hours)
Description
Parallel Sysplex - Fundamentals 2.5
3 This course begins by describing how the Parallel Sysplex evolved and why it is integral component of today's enterprise IT environment. Its key features are discussed in terms of the benefits it provides to the organization - system availability, data integrity, workload and data sharing, and automated recovery to name a few. A break-down of the major Parallel Sysplex components is then presented, describing their importance and how they can be configured.
  »  PL/1 Programming
Course Title Duration Description
PL/1 Fundamentals and Data Representation
5 The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language.
PL/1 Program Design Techniques
5 The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions.
PL/1 Accessing Data in Files
5 The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions.
PL/1 Preprocessor, Debugging and Advanced Coding
5 The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language.
  »  Python Programming
Course Title Duration
(Hours)
Description
Python – Python on z/OS Fundamentals
1 This course provides the user with a broad overview of Python programming in the z/OS environment, covering the installation of Python and its prerequisites, as well as the construction and execution of Python scripts using the z/OS UNIX Shell and the BPXBATCH utility. Additionally, students will learn about various encoding options for Python files and how to tag files appropriately. Furthermore, the course provides an overview of the packages included with IBM Python, as well as suggestions for other useful packages that can be implemented.
  »  Quantum Computing
Course Title Duration
(Hours)
Description
Quantum – Easy Introduction to Quantum Computing – Expert Videos
.75 In this expert video, Quantum computing is explored from its inception to its current state and future possibilities. The presenter delves into the specifics of what Quantum computing is and clears up common misconceptions about its purpose. The video also provides an overview of the prominent hardware and software providers in the Quantum computing space and highlights their current offerings. Additionally, the video showcases various practical applications of Quantum computing, which helps to explain the hype surrounding this exciting technology.
Quantum – Quantum Computing and Qiskit
5 This course begins by looking back through history to see how calculation has evolved, and the advancements in technology and tools, which have lead us to where we are today – quantum computing. You will then see how Qiskit is used for working with quantum computers, how it is installed, and the process of connecting it to a backend simulator or real quantum computer. You will also look at the Qiskit community and how you can contribute to Qiskit’s open source code. Finally, you will discover how algorithms have evolved and the role quantum algorithms will play in the future.
Quantum – Installing Qiskit on IBM LinuxONE – Expert Videos
.75 This expert video delves deeper into the capabilities of Qiskit, an open-source quantum computing software development kit. The instructor provides an in-depth explanation of its functionality before demonstrating the process of downloading and installing Qiskit onto a LinuxONE server. This is done in order to prepare for the execution of a quantum program within the IBM Quantum environment.
  »  REXX (REstructured eXtended eXecutor language)
Course Title Duration Description
REXX – Fundamentals
4 This course introduces you to REXX, describing why it is still popular today and the myriad of resources that are available to help build your skills and knowledge. It also looks at the main features of REXX and how coding in this language can benefit various job roles within the organization. Before diving into the actual REXX code, an overview of REXX programming editors is provided to assist you in identifying appropriate work tools for use with this programming language.
REXX – Coding and Execution Basics
4 In this course you will discover that REXX has simple syntax and coding requirements compared to many other programming languages. You will look at the general structure of a REXX program concentrating on the types of data that can be coded. This is then wrapped around best practices, using your organization’s standards and general programming rules. Finally, you will see where and how REXX program code is stored, and the different ways it can be invoked.
REXX – General REXX Instructions
3 In this course you will begin by seeing how simple arithmetic calculations are performed using REXX, and then progress to more powerful complex calculations. You will see how a simple REXX conversational program is built, and how data passed to a REXX program can be parsed to create variables. The value and use of compound variables is also examined.
  »  SDSF 2.5 (System Display & Search Facility)
Course Title Duration Description
SDSF – Introduction and Basic Concepts 2.5
3 The SDSF – Introduction and Basic Concepts course describes the purpose of SDSF, providing details on how SDSF is accessed and how you interact with it.
SDSF – Working with SDSF Data 2.5
4 The SDSF – Working with SDSF Data course explains how data is located in SDSF screens and the use of filtering commands to display specific information. A description of SDSF logs and how they are used is also presented.
SDSF – Operations 2.5
3 The SDSF – Operations course discusses how SDSF is configured and initialized. It looks at the commands used to start and stop SDSF servers and the use of the MODIFY command to update server attributes and invoke tracing and debug facilities.
SDSF – Job Activity Basics 2.5
3 The SDSF – Job Activity Basics course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands.
SDSF – Controlling and Managing Jobs 2.5
3 The SDSF – Controlling and Managing Jobs course describes how a submitted job uses its job class to determine the type of initiator that will select it, and shows how job class attributes can be modified. SDSF actions used to start, hold, and terminate batch jobs and started tasks, is also presented.
SDSF – Advanced Job Management and Monitoring 2.5
3 The SDSF – Advanced Job Management and Monitoring course describes how the SDSF MAS panel is used to display MAS member status and attributes. Commands used to display MAS member and JES2 statistics are presented as well as commands used to control MAS member activity. Various SDSF panels, used to obtain in-depth job analysis information, are examined, describing how they can be used to determine performance or aid in job resolution.
SDSF – Using SDSF to Display and Control Job Output 2.5
3 The SDSF – Using SDSF to Display and Control Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether.
SDSF – Using SDSF to Display and Control Printers 2.5
3 The SDSF – Using SDSF to Display and Control Printers course shows how to display and modify printer attributes and manipulate printer activity.
SDSF – System Health and Managing JES2 Resources 2.5
3 The SDSF – System Health and Managing JES2 Resources course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages.
SDSF – Using SDSF to Work with System Information and Devices 2.5
4 The SDSF – Using SDSF to Work with System Information and Devices course describes how to display the contents of spool volumes, and manage spool volume availability. It explains how a spool offload is performed when data needs to be moved from spool devices. Tasks associated with displaying and managing JES2 nodes and lines is presented, and the process of obtaining a wide range of system information and defaults is also covered.
SDSF – Using SDSF to Perform Advanced System Monitoring 2.5
3 The SDSF – Using SDSF to Perform Advanced System Monitoring course describes SDSF panels that system programmers can use to analyze storage and address memory information. It also discusses how key system libraries and their attributes can be displayed using various SDSF panels. This information can assist systems programmers with analyzing and diagnosing information that may be affecting the performance of workloads and availability of the system.
SDSF – Advanced – Tips and Tricks 2.5
1 This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS.
  »  Security Curriculum 2.5
Course Title Duration Description
Introduction to Mainframe Security Series 2.5
Security – Introduction to Mainframe Security z/OS 2.5
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
RACF for z/OS v2.5 Series
RACF – Introduction 2.5
3 This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.
RACF – Defining and Managing Users in RACF 2.5
4 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Defining and Managing Users in RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Protecting Data Sets Using RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Protecting Data Sets Using RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF - Managing Digital Certificates 2.5
3 In this course you will see how encryption keys are used to securely manage data, and the standards that enforce encryption protocols. You will be introduced to various types of certificates and see how data that is stored in them. From a z/OS perspective you will see how IBM’s Digital Certificate Access Server (DCAS) provides password free access to that environment using a certificate. Commands used to generate and manipulate digital certificates, and key rings is discussed in detail.
RACF and z/OS UNIX 2.5
3 This course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
RACF – For System Programmers 2.5
3 This course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.
RACF – For Auditors 2.5
4 This course describes the various types of data center audits and discusses the role of an internal auditor when performing a RACF audit. It expands this to look at the general steps to ensure that RACF managed security is aligned with both organizational security standards, and external compliance regulations. RACF auditor privileges are discussed in detail describing how audit information is stored and the commands used to request the capture of specific events. The type of data that can be unloaded from SMF, and the RACF database, is explained along with details on how ICETOOL can be used to process this information to create audit reports.
  »  Service Oriented Architecture
Course Title Duration Description
Service Oriented Architecture 4 This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption.
  »  TSO/ISPF 2.5 (Time Sharing Option & Interactive Systems Productivity Facility)
Course Title Duration
(hours)
Description
ISPF (z/OS) – TSO and ISPF Basics 2.5
3 The TSO and ISPF Basics course explains the purpose of TSO and ISPF, and describes how each of these products is accessed. Common TSO commands are presented, providing scenarios where they are used. ISPF screen navigation using commands, and the ISPF Action Bar, are also discussed.
ISPF (z/OS) – Configuring ISPF for General Use 2.5
3 The Configuring ISPF for General Use course explains how ISPF product defaults are displayed, and how they can be modified to suit the user’s requirements. The use of function keys is discussed as well as the methods used to create, and navigate to, multiple logical ISPF screens.
ISPF (z/OS) – Managing Data Files and Definitions with ISPF/PDF 2.5
5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects.
ISPF (z/OS) – Displaying and Manipulating Data in View and Edit Mode 2.5
3 The Displaying and Manipulating Data in View and Edit Mode course explains how to access a data set in View and Edit mode, and explains the difference between these modes. It then describes how to scroll and navigate in Edit mode, and introduces the common edit line commands.
ISPF (z/OS) – Using Edit Primary Commands 2.5
3 The Using Edit Primary Commands course describes the commands used to display and update data in ISPF edit mode. This function allows you to perform multiple changes to all, or part of the data, being edited. This course also discusses how data from an edit session can be saved, exited without saving, and copied to another data set or partitioned data set member.
ISPF (z/OS) – Advanced ISPF Data Editing Techniques 2.5
3 The Advanced ISPF Data Editing Techniques course describes how various tabbing facilities can be used in an ISPF edit session to automatically place the cursor in specific columns, allowing for easier bulk data entry. It also discusses how boundaries can be defined to the data being edited and looks at edit data profile attributes, and how they can be updated.
ISPF (z/OS) – Advanced – Tips and Tricks – TSO 2.5
2.5 This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent versions of z/OS.
  »  Utilities 2.5
Course Title Duration Description
Utilities – General Data Set Utilities 2.5
4 This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Copy, Compare, and List Data Utilities 2.5
3 Operators, application and system programmers who have a need to code and execute batch utilities that are used for manipulating data set content.
Utilities – Sort and Update Data Utilities 2.5
3 This course looks IEBUPDTE and DFSORT utilities and provides real-life examples describing how they are used to modify and sort data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Advanced – Tips and Tricks 2.5
1.5 This course contains many Utility-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with latest z/OS releases.
  »  VSAM 2.5
Course Title Duration Description
Introduction to VSAM 2.5
6 This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors.
VSAM – Defining, Altering, and Deleting VSAM Data Sets z/OS 2.5
3 This course describes how VSAM data sets are created using the IDCAMS Utility, or by using JCL statements. It also discusses how alternate indexes on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced – both from IBM and other vendors.
VSAM – Working with VSAM Data Sets z/OS 2.5
3 This course discusses various methods for displaying, and printing all, or partial, data from a VSAM data set. It also describes how IDCAMS can be used to copy VSAM data and introduces several other products used to manage VSAM data sets.
VSAM - Managing VSAM Data 2.5
3 This course explains how VSAM data can be configured, allowing it to be shared by jobs, TSO users, UNIX processes and started tasks. It also addresses recovery options available when VSAM data is shared. A detailed explanation of parameters affecting VSAM performance is covered as well as the types of utilities used to capture VSAM performance statistics.
VSAM – Advanced - Tips and Tricks 2.5
.5 This course contains many IDCAMS utility tips, tricks, techniques, and best-practice items associated with VSAM data.
  »  Virtualization (z/VM 7.3)
Course Title Duration Description
Version 7.3
z/VM – Introduction and Concepts z/VM 7.3
3 The z/VM – Introduction and Concepts course describes how virtualization, and in particular z/VM, has become more popular in Data Centers. It explains the benefits of virtualization and some of its challenges, and describes how virtualization is used in the cloud. Content then focuses on z/VM describing how this operating system supports virtualization.
z/VM – System Initialization and Shutdown z/VM 7.3
4 The z/VM – System Initialization and Shutdown course examines the processes used for z/VM start-up and shutdown.
z/VM – Monitoring and Controlling z/VM Operations z/VM 7.3
5 The z/VM – Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources.
z/VM – Managing Guest Operating Systems z/VM 7.3
4 The z/VM – Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM. This includes the Conversational Monitor System (CMS), which is the default guest operating system that comes with z/VM. You will also look at the commands used to IPL, pause, restart, and shut down a guest operating system, and how to IPL the system automatically and manually.
z/VM – Managing CMS Files z/VM 7.3
4 The z/VM – Managing CMS Files course describes how to create lists of CMS files from which you can delete and rename files, and copy and compare their contents. You will also see how CMS files can be sent to other users, and how they are saved on the user’s disk after transmission. You will also see how the XEDIT utility can be used to add data to a CMS file.
z/VM – Identifying and Resolving z/VM Problems z/VM 7.3
5 The z/VM – Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also discussed.
  »  WebSphere Curriculum
Course Title Duration Description
WebSphere - Introduction to Java and WebSphere Application Server
3 This course introduces Java, one of the most popular programming languages in modern IT and its extended version, Jakarta Enterprise Edition (Jakarta EE), which itself is another popular version of Java that has found its place supporting and running back-end enterprise applications. The course also introduces IBM’s WebSphere Server Application and how it serves in implementing Java/Jakarta EE services within an enterprise IT environment.
WebSphere - Introduction to Java and WebSphere Application Server on z/OS
4 In this course you are introduced to how Java works in a z/OS environment and some of the tools available. The course then introduces you to WebSphere Application Server for z/OS and WebSphere Application Server for z/OS Liberty and their key features. The course then looks deeper into how WebSphere Application Server for z/OS and its Liberty variant interact and work with z/OS resources.
  »  z/OS 2.5
Course Title Duration
(hours)
Description
z/OS Series
z/OS – Concepts 2.5
7 The z/OS Concepts course describes the evolution of mainframe enterprise computing and provides descriptions of the major components that comprise today’s z/OS environment.
z/OS – Managing and Processing z/OS Data 2.5
4 The Managing and Processing z/OS Data course describes how I/O, which is the reading and writing to external devices such as disks, tape, printers, and networks, is performed in a z/OS environment. It then discusses the various z/OS-related resources that can be shared and the role of workload management in prioritizing workloads.
z/OS – Initializing and Terminating the z/OS System 2.5
4 The z/OS – Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system start-up and shutdown, describing the most common commands and operator responses.
z/OS – Displaying z/OS System Activity 2.5
4 This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices.
z/OS – Advanced z/OS Monitoring Facilities 2.5
4 This course provides an overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS as well as a description on how SMF data is created and managed. This course also discusses the need for message suppression and describes how this is achieved.
z/OS – Identifying z/OS System Problems 2.5
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.
z/OS – Removing Tasks from the z/OS System 2.5
3 This course describes the processes and commands required to remove tasks, users, and batch jobs from a z/OS system.
z/OS – Techniques for Handling General z/OS Problems 2.5
3 This course introduces several techniques and processes used to assist with resolving z/OS system problems.
z/OS – Advanced – Tips and Tricks 2.5
2 This course contains many z/OS-related tips, tricks, techniques, and best practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.4 and z/OS 2.5.
z/Architecture Series
z/Architecture – Processing Workloads 2.5
5 The z/OS Architecture – Processing Workloads course describes how today’s z/OS system processes workloads, focusing on the concepts of address spaces showing how they provide the environment under which tasks can run. You will look at the different types of CPUs that can be configured in a z/OS system and see how programs issue instructions to the CPU. Diving down deeper you will then look at the CPU chips themselves and view the components that comprise them, looking at their involvement in processing work. Finally, the major components that comprise the mainframe’s I/O structure are presented to show how work moves throughout the z/OS environment.
z/Architecture – Memory, Address Spaces, and Virtual Storage 2.5
3 Processor storage, real storage, or central storage. Whatever you call it, it is the memory where z/OS programs and their data need to reside before they can be processed, and like other mainframe resources it can be virtualized. In this z/OS Architecture – Memory, Address Spaces and Virtual Storage course, you will see how the address spaces discussed in the previous course, access and free the memory they require to process work. You will also see how virtualization of this resource occurs, which for IT specialists will provide them with knowledge to troubleshoot memory-related issues.
z/OS Console Simulations Series
z/OS – MVS Command Simulations 2.5
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS – System Shutdown and IPL Simulations 2.5
3.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shut-down and start-up of a z/OS system.
Installing and Managing z/OS 2.5 Software Series
SMP/E – Introduction to SMP/E 2.5
3 Ensuring that all of your organization’s z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software.
  »  z/OS Connect for z/OS 2.5
Course Title Duration Description
z/OS Connect – IBM z/OS Connect 3.0
5 The IBM z/OS Connect Version 3.0 course discusses the importance of organizations taking advantage of opening up their mainframe data to cloud, mobile, and web customers through the use of RESTful APIs, and describes how z/OS Connect provides this capability. The course also covers what IT specialists need to know on how resource access and data communication is performed by z/OS Connect including the different aspects of z/OS Connect OpenAPI 2 and z/OS Connect OpenAPI 3 and how each can be used.
  »  z/OS Management Facility for z/OS 2.5
Course Title Duration Description
z/OSMF – Introduction and Basics z/OS 2.5 1 This course provides the learner with an introduction to the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it.
z/OSMF – Working with z/OSMF Tasks z/OS 2.5 4 This course provides the student with the skills needed to use some of the major z/OSMF features: problem management, workflow creation, software management and deployment, and cloud provisioning.
z/OSMF – Configuring and Administering z/OSMF z/OS 2.5 3 This course outlines how z/OS tasks such as the configuration of workload management, and network configuration can be performed using z/OSMF. It also explains how performance monitoring, and management of processor capacity tasks, can be performed within z/OSMF.
  »  z/OS UNIX System Services 2.5
Course Title Duration Description
z/OS UNIX - z/OS UNIX System Services Basics 2.5
3 This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used.
z/OS UNIX - Interacting with the z/OS UNIX System 2.5
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
z/OS UNIX - Working with z/OS UNIX 2.5
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
  »  Zowe Curriculum
Course Title Duration
(hours)
Description
Zowe Foundations
3 The Zowe Foundations course begins by describing the features of Zowe, and the major components that comprise this product: Zowe Application Framework, Zowe Command Line Interface (CLI), Zowe Explorer, Zowe Desktop, and API Mediation. Examples show how users interact with these Zowe components and the advantages of using them. The course then dives into more detailed information, describing how Zowe and its components are started and run, describing any prerequisites that are required. The default capabilities of each component is presented as well as methods that can be used to create or import additional functionality. The final module in this course looks at the installation and customization possibilities when dealing with Zowe server and client components.

Help Center


Instant Web Chat:

Chat with tech support or
have a product question?

Call Us:

Americas: +1 800 574 4262
Europe, Middle East, and
Africa: +44 808 2343 496


Search our catalog