Courses

This is a complete list of all Interskill self-paced elearning courses grouped by curriculum. Our learning designs are informed by contemporary learning theory and are interactive, contextualized and responsive to diverse learning styles. We believe in immersing learners in relevant authentic activities designed to motivate, engage, and produce quantifiable change.

Assembler Introduction

Duration: 5hrs

The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability.

Assembler Instructions

Duration: 7hrs

The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed.

Assembler Macros

Duration: 5hrs

The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use.

Assembler Programming

Duration: 8hrs

The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings.

Assembler z/OS Advanced

Duration: 5hrs

The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.

Assembler Cross Memory Services

Duration: 4hrs

The z/OS - Cross Memory Services course describes the components involved in cross memory communications that allow a service provider's address space to connect with a user's address space. You will also look at the linkage stack and service provider coding with an emphasis on Program Call (PC) routines and the cross memory user. Finally, you will see how data is traditionally copied in a cross memory environment, and also look at how this is performed using Data-in-virtual.

View series

Introduction to CONTROL-M for z/OS

Duration: 3hrs

The Introduction to Control-M for z/OS course begins by describing the need for workload scheduling, introducing BMC Control-M for z/OS and describing its general function. It then looks at how this product is accessed using a traditional 3270 interface, as well as the Control-M EM GUI.

Defining and Scheduling Jobs Using Control-M for z/OS

Duration: 4hrs

The Defining and Scheduling Jobs Using Control-M for z/OS course works through the process of creating definitions used to schedule jobs. It begins by introducing the concept of calendars, and describing how various types of calendars can be created. It then jumps to the actual job definition, describing how it can be used to provide diverse scheduling requirements. Automated actions performed following job completion are also discussed. The final module delves into the use of system and user-defined variables and describes how they can be used to dynamically modify JCL submitted from a Control-M job definition.

Monitoring and Managing Job Processing

Duration: 4hrs

The Monitoring and Managing Job Processing course describes how jobs are monitored using the Active Environment screen, looking at job statuses and commands used to manipulate jobs. It then turns to the monitoring and management of other Control-M components, including the log, conditions, and control and quantitative resources. In the final module, an overview of the utilities that run automatically, and those that can be invoked manually, are discussed, as well as the types of reports that can be run, are covered.

View series

Introduction to CA Workload Automation – CA 7® Edition

Duration: 4hrs

This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions.

CA 7 Workload Automation – Scheduling Batch Processing

Duration: 6hrs

This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7.

CA 7 Workload Automation – Monitoring and Managing the Batch Processing Environment

Duration: 6hrs

This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes.

CA 7 Workload Automation – System Programmer Interaction with CA 7

Duration: 4hrs

This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting.

CA 7 Workload Automation – Backup, Recovery and Problem Resolution

Duration: 5hrs

This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided.

View series

The CA OPS/MVS® Event Management and Automation – Overview, Components and Features

Duration: 5hrs

The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided.

The CA OPS/MVS® Event Management and Automation – Rules and OPS/REXX

Duration: 5hrs

The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided.

The CA OPS/MVS® Event Management and Automation – Automating Events Using the Relational Data Framework

Duration: 5hrs

The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation.

The CA OPS/MVS® Event Management and Automation – Automating Events Using the System State Manager (SSM)

Duration: 5hrs

The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed.

The CA OPS/MVS® Event Management and Automation – Schedule and Group Managers for Event Management

Duration: 4hrs

The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed.

View series

CICS TS – Programming Basics 5.6

Duration: 6hrs

The CICS TS - CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product.

CICS TS – Program Control and Communication 5.6

Duration: 6hrs

The CICS TS - Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas.

CICS TS – Files and Databases 5.6

Duration: 4hrs

This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2.

CICS TS – Storage and Transient Data 5.6

Duration: 4hrs

This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues.

CICS TS – Programming for Web Access 5.6

Duration: 4hrs

This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them.

CICS TS – Using CICS Transaction Gateway 5.6

Duration: 3hrs

This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS.

CICS Terminal Communications 5.6

Duration: 6hrs

The CICS TS - CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment.

CICS TS – Using SDF II to Maintain CICS TS Maps 5.6

Duration: 2hrs

This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps.

CICS TS – Programming for Recovery 5.6

Duration: 3hrs

This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery.

CICS TS – Debugging CICS Programs 5.6

Duration: 4hrs

The CICS TS - Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces.

View series

COBOL Programming – Basics

Duration: 6hrs

The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions.

Data and Datafile Definitions in COBOL

Duration: 4hrs

The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways.

COBOL Programming – Manipulating Data

Duration: 6hrs

The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index.

COBOL Programming – Advanced

Duration: 5hrs

The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program.

COBOL – IBM Enterprise COBOL 6.3 for z/OS

Duration: 4hrs

The COBOL - IBM Enterprise COBOL 6.3 for z/OS course is designed for learners with a basic understanding of generic COBOL who need to extend its use to the z/OS environment. It describes how COBOL programs are made available through compile and bind processes and discusses coding and options specific to the z/OS environment. The use of IBM's Language Environment is presented, and a number of coding techniques used to improve the performance of COBOL running on z/OS, is also shown.

Accessing IMS Databases from COBOL

Duration: 3hrs

The Accessing IMS Databases from COBOL course details the structure and use of an IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained.

View series

Storage – Introduction to Storage and Disk Systems z/OS 2.5

Duration: 3hrs

This course describes how data center storage has evolved and its future in this environment. It then focuses on the hardware and software that comprises today's disk and flash systems and how this meets the need of the data center.

Storage – Understanding Tape Storage z/OS 2.5

Duration: 3hrs

This course discusses how tape usage in data centers has evolved and looks at the purpose of this medium in today's environment. An overview of tape storage capabilities is discussed before looking at the emergence of virtual tape and how it is either replacing traditional tape systems, or working with them, to meet the data storage demands of the enterprise.

Storage – Networks, Administration, & DASD Management Using ICKDSF z/OS 2.5

Duration: 4hrs

This course provides an overview of network storage configurations and the monitoring and management tasks associated with the Storage Administrator role are also discussed.

Storage – Managing z/OS Data Using DFSMS Constructs z/OS 2.5

Duration: 5hrs

This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment.

Storage – Storage & Tape Administration Using DFSMShsm & DFSMSrmm z/OS 2.5

Duration: 3hrs

Initial content discusses space administration needs looking at data center backup and migration requirements, and then showing how this is achieved using DFSMShsm. The management of tape volumes and labels using DFSMSrmm is also covered in detail.

View series

Databases – Introduction to Databases and Database Managers

Duration: 4hrs

This course provides you with a core understanding of the need for databases, the way they are structured, and the type of information they can hold. It describes the types of database models that you are likely to encounter and describes their pros and cons. The use of a Database Management System (DBMS) is discussed, providing examples of functionality and features that are often employed by users of it. Finally, you will see how a database is defined and configured, along with the types of tasks that need to be performed as part of this process.

Databases – Introduction to SQL

Duration: 4hrs

This course begins by providing you with an overview of SQL functionality, and describes how SQL is used to obtain data from a database table. Once data has been obtained there are many scalar and aggregate functions that can be used for purposes such as creating a subset of that data, or manipulating the data itself into another format. This is discussed in detail. Finally, you will see how data can be added to a database, and how it can be modified, and deleted.

Databases – Advanced SQL

Duration: 4hrs

This course provides you with more in-depth uses of SQL. It begins by examining how data from multiple tables can be joined together, and how different types of JOIN statements can be used to achieve your goal. You will also see how specific data can be selected from tables and how conditional operations can be invoked based on data values. The merging of results from multiple SELECT statements is also presented. Finally, you will see how a SELECT query can exist within another SELECT statement. These are called subqueries.

Databases – Database Manager Resources

Duration: 4hrs

This course starts by providing you with the methods used to create a database and its components. It then introduces you to the commands used to alter database component attributes and shows you how to remove data. You will see how commonly used instructions can be saved as a stored procedure, and the benefits they provide. You will then look at user-defined functions (UDFs), how they are created, and how they differ from stored procedures. Finally, you will be presented with various methods for securing your database.

Databases – Database Communication

Duration: 3hrs

This course describes how local and remote clients can connect to a DBMS server. It discusses connection options including the use of APIs. You will also see how an administrator can view existing client connections and configure the DBMS to place restrictions on client activity. Finally, you will see how replication provide copies of database systems on alternate DBMS servers. This is useful for redundancy purposes.

View series

DR – Ensuring Data Center Business Continuity

Duration: 3hrs

This course begins by immersing the learner in a full scale disaster, getting them to think about all the elements involved in not only recovering data, but also ensuring that the overall business runs as per expectations. It then describes what business continuity is, citing well known events, and where disaster recovery fits in. The course is then extended to explain common business continuity strategies and looks at standards, in particular ISO22301, to see how current standards tackle this important facet of business life.

DR – Data Center Disaster Recovery Planning

Duration: 5hrs

Initial content is management-focused, covering the role of individuals and groups responsible for creating, modifying, and testing the organization's Business Continuity Disaster Recovery (BCDR) program. It explains broadly the tasks that need to be performed and the consequences should they fail.

DR – Data Center Backup and Recovery Strategies

Duration: 5hrs

Initial content focuses on the importance for organizations to properly protecting their digital assets from data loss and data corruption. An overview of common data center backup strategies and methods is provided along with details on how encryption is used to safeguard backups. The benefits of using Geographically Dispersed Parallel Sysplex (GDPS) technologies is presented and the various configurations available with this solution are covered in detail. Cloud based facilities such as Disaster Recovery-as-a-Service (DRaaS), and Backup-as-a-Service (BaaS), are discussed, describing the benefits and challenges of each.

View series

Z Performance – Introduction to Mainframe Performance z/OS 2.5

Duration: 3hrs

The Introduction to Mainframe Performance course provides the learner with a core understanding of what performance measures are required when managing a mainframe environment. Measuring the usage of critical resources is discussed, and potential issues that can affect the performance of tasks running in a z/OS system are presented.

Z Performance – z/OS I/O Performance and Capacity Planning z/OS 2.5

Duration: 3hrs

In this course you will examine the I/O process and see how I/O performance problems are detected, and the metrics used to determine where a problem may exist. Methods used to improve I/O performance are also discussed.

Z Performance – z/OS Performance Tools and Software Pricing z/OS 2.5

Duration: 3hrs

In this course you will discover how SMF is used to capture important system activity and store it as specific record types. You will see how these records are structured and the utilities used to convert their content into a readable format. Commands used to display, configure, and manipulate SMF are covered, as well as the process of archiving SMF records and creating your own SMF records. Following this, an introduction to software licensing is presented, describing common licensing models and the metrics they use to determine the cost to the customer. This information will assist the user in determining ways to minimize software licensing costs.

Z Performance – z/OS Workload Manager z/OS 2.5

Duration: 3hrs

The Z Performance - z/OS Workload Manager course provides the learner with steps describing how WLM components are created and linked, to form a WLM policy. The course then progresses to discussing in detail various workloads and the goals and importance that should be assigned to them. This is followed by an overview of performance information that can be obtained through SMF records, MVS commands, and SDSF.

View series

IBM MQ – Introduction to IBM MQ

Duration: 4hrs

This course provides the learner with basic information about IBM MQ, initially describing how it is used and then branching out discussing its features. A detailed breakdown on IBM MQ components and their structure are provided, providing you with an overview on how it could be configured in your environment. Finally, the use of IBM MQ in a z/OS environment is covered with details on how it differs from other platforms.

IBM MQ – MQ Operations and Administration

Duration: 6hrs

This course begins by describing IBM MQ, and its common deployment options, and then is expanded to show how an IBM MQ queue manager is created. Various commands used to interact with MQ components are discussed throughout the remaining content, showing how definitions are created and displayed, and modifications that can be made to them. A focus on the security of MQ resources and the authentication required to access them is also presented.

IBM MQ – MQ Operations and Administration for z/OS

Duration: 4hrs

This course looks at the differences between traditional MQ, and how it is implemented and run in a z/OS environment. It discusses the use of z/OS datasets and files that need to be created as well as the procedures used to enable MQ in z/OS. You will see how traditional MQ commands map to z/OS, and how MQ resources are managed using z/OS online facilities and batch utilities. Security for MQ resources on z/OS is examined along with tools and utilities used for monitoring aspects of MQ performance.

IBM MQ – MQ for Application Programmers

Duration: 4hrs

This course begins by identifying the basic programming code used by applications to interact with IBM MQ. It describes the MQ messaging process and then delves more heavily into the commands that can be used to get and put MQ messages, and manage MQ objects. Details on programming with MQ in a z/OS environment is provided, explaining core differences when using that platform.

View series

SA z/OS – IBM Z System Automation

Duration: 1hrs

The SA z/OS - IBM Z System Automation course provides the learner with a basic understanding of what IBM Z System Automation is and how it can be used in today’s modern enterprise. The course begins with looking at some of the benefits the product provides in managing system resources through automation. The course also covers the various components that enable automation functionality. Finally, the course delves further into what tools are available for IT personnel to interact with use with IBM Z System Automation.

SA z/OS – IBM System Automation: Planning, Installation, and Customization

Duration: 3hrs

The SA z/OS - IBM System Automation: Planning, Installation, and Customization course, takes the user through the steps required to install, and configure SA z/OS V4.2 onto their system. Initial content covers implementation considerations, and provides the learner with tools used in the planning and installation process. The configuration assistant section describes how some of these implementation tasks can be automated. The Customization Dialog module describes how this product is used to build an SA z/OS automation policy database. It guides the learner through the creation of database entries, to the compilation of the Systems Operations Configuration File, enabling it for distribution and use by an automated system.

SA z/OS – IBM System Automation: Operations

Duration: 3hrs

The SA z/OS - IBM System Automation: Operations course, focuses on the SA z/OS administration and monitoring tasks performed by operations and administrator personnel. Initial content looks at initializing SA z/OS, and describes start-up options that can be invoked for the automation manager and automation agent. Tasks that allow you to refresh automation configuration data, and enable automation through the use of automation flags, pacing gates and runmodes is also discussed. SA z/OS functionality that may unintentionally inhibit automation activity, and how these issues are resolved is also covered.A detailed look at the commands and tools used to display and manage SA z/OS activity is provided, and details associated with diagnosing and resolving common problems is discussed.

SA z/OS – Automation Definitions Introduction and Workshop

Duration: 3hrs

The SA z/OS - Automation Definitions Introduction and Workshop course, begins by describing the key Entry Types that can be defined in an SA z/OS policy database, and their purpose. Following this, a workshop-style module provides you with hands-on exercises used to create an application, application group and related automation definitions.

SA z/OS – Advanced Automation and Reporting

Duration: 4hrs

The SA z/OS - Advanced Automation and Reporting course, introduces the learner to some more advanced implementation and configuration possibilities focusing on end-to-end automation, and the automation of CICS, IMS, and Db2 environments. It also looks at various methods used to report on the policy database content, automation activity, and statistics produced by SMF relating to automation usage.

View series

IMS 15 Introduction

Duration: 5hrs

The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts.

IMS 15 Commands

Duration: 4hrs

The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided.

IMS 15 Databases

Duration: 4hrs

The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations.

IMS 15 Transaction Manager for Programmers

Duration: 4hrs

This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use.

View series

IBM (z/OS) – The Evolving Mainframe 2.5

Duration: 3hrs

This course describes what a mainframe is, how it has survived, and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components that you will find in a typical mainframe environment.

IBM (z/OS) – Working with the Mainframe 2.5

Duration: 3hrs

This course begins by explaining how data is stored in a mainframe and the type of security that protects it. It then discusses the core products used to prioritize and process that data. Locating system documentation is going to be important for anyone working on the mainframe, for example error message manuals, product installation processes, so knowing how to access it is important. This is covered in the last module of this course.

IBM (z/OS) – z/OS Systems Programming Basics 2.5

Duration: 4hrs

This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, and the system data sets and parameters that are used to initialize and configure the z/OS system.

IBM (z/OS) – z/OS System Initialization & Configuration for Sys Progs 2.5

Duration: 3hrs

This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization, and JES2 configuration. and how system data sets and parameters can be modified in response to system issues.

IBM (z/OS) – Application Programming Basics 2.5

Duration: 4hrs

This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data.

IBM (z/OS) – Application Programming Environment Overview 2.5

Duration: 3hrs

This course discusses widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST, Java, and Python, and describes how the Language Environment provides many of these languages with common runtime routines.

Sys Prog – Tips to Advance Your Systems Programmer Career – Expert Videos

Duration: .7hrs

In this set of expert videos, Meral Temel presents a list of practical tips that will help you become a more successful Systems Programmer. She emphasizes that learning is something that never stops and that Systems Programmers today need to accept that they cannot know everything and to target smaller areas of learning, and to look at the big picture of work they are performing. She discusses the importance of note taking, creating to-do and to-learn lists, and planning, as well as providing ideas on how best to address troubleshooting. Finally, Meral discusses how learning about performance-related aspects of the mainframe will stand you in good stead as it is woven into almost every Systems Programmer task.

View series

Java on z/OS for Java Programmers

Duration: 1hrs

This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere.

Java Introduction for the IBM Enterprise

Duration: 3hrs

This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the basic concepts of object orientation and how it differs from programming languages traditionally used in an enterprise environment. The majority of content focuses on the structure of the Java language, and the tools and utilities that support the Java environment.

Java Programming for the IBM Enterprise

Duration: 7hrs

This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. A breakdown of code commonly used with Java programming is supplied, providing equivalent COBOL examples along the way.

Java Data Access for the IBM Enterprise

Duration: 3hrs

This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use JavaBeans as reusable objects and enterprise JavaBeans for accessing the facilities provided by enterprise systems.

View series

JCL (z/OS) – Introduction to JCL 2.5

Duration: 3hrs

The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.

JCL (z/OS) – JCL Coding Basics – JOB and EXEC Statements 2.5

Duration: 4hrs

This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.

JCL (z/OS) – JCL Coding Basics – DD Statements and Data Sets 2.5

Duration: 4hrs

The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones.

JCL (z/OS) – JCL Coding Basics – DD Statements and SYSOUT 2.5

Duration: 3hrs

The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course looks at the coding for printed output and job SYSOUT.

JCL (z/OS) – Advanced JCL Data Set Use 2.5

Duration: 5hrs

The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.

JCL (z/OS) – Controlling Job and Step Processing 2.5

Duration: 3hrs

While JCL is generally rigid in the way that it runs programs and related jobs, in recent years there have been several advancements in code that can be used to conditionally run steps, and schedule jobs. This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.

JCL (z/OS) – Working with Procedures and Symbols 2.5

Duration: 3hrs

Previous courses have described many of the statements and parameters to build a basic job. This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.

JCL (z/OS) – Running and Debugging JCL 2.5

Duration: 3hrs

In previous JCL courses you have been presented with many examples of the types of errors that can be produced when running your JCL. This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.

JCL (z/OS) – Advanced – Tips and Tricks 2.5

Duration: 1hrs

This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with various z/OS releases, and provides details on statements and parameters that have evolved over the last few years.

View series

JES2 – Basics 2.5

Duration: 3hrs

This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology.

JES2 – Understanding JES2 Processing 2.5

Duration: 4hrs

This course describes how JES2 devices are used, their possible statuses, and how batch jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes.

JES2 – Using JES2 Commands 2.5

Duration: 3hrs

This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. An overview of commonly used JES2 commands is also provided.

JES2 – Monitoring Jobs, Initiators, and Printers Using JES2 Commands 2.5

Duration: 3hrs

This course begins by looking at the JES2 commands used for displaying printer, initiator, and spool activity, and then focuses on batch jobs and the JES2 commands used to display their status and attributes.

JES2 – Managing Batch Processing in a JES2 Environment 2.5

Duration: 4hrs

This course builds from previous training, describing commonly used JES2 commands used to manage and schedule batch job activity. It also introduces JES2 networking capabilities, describing how batch jobs can be scheduled for processing on other mainframe sites within the organization.

JES2 – Controlling JES2 Initiators and Printers 2.5

Duration: 3hrs

This course discusses the manipulation of JES2 initiator and printer resources that are associated with job, and job output, processing.

JES2 – Resolving Network and Spool Space Problems 2.5

Duration: 3hrs

This course provides you with examples of common JES2 batch job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues.

JES2 – Managing JES2 Checkpoints 2.5

Duration: 4hrs

This course provides detailed information relating to the function and use of JES2 checkpoints; their placement, and attributes, along with steps required to resolve problems associated with this resource.

JES2 – Identifying and Resolving JES2 System Problems 2.5

Duration: 5hrs

This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully.

JES2 – Advanced – Tips and Tricks 2.5

Duration: .5hrs

This course contains many JES2-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent z/OS releases.

JES2 – Command Simulations 2.5

Duration: 2hrs

A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources.

View series

JES3plus – JES3plus Fundamentals

Duration: 3hrs

This course provides an introduction to the evolution of mainframe processing, which led to the development of the job entry subsystem, JES3plus. Key concepts about JES3plus and how it manages system resources and workflow are covered along with details on who needs to interact with JES3plus regularly.

JES3plus – JES3plus for System Operators

Duration: 1hrs

This course gives system operators insight into JES3plus commands that are used in performing inquiries on jobs and devices, how to modify a job’s properties, and how to vary the status of devices. Also discussed are commands used to start and stop JES3plus and what start options can be used and when.

JES3plus – JES3plus for System Programmers

Duration: 1hrs

This course provides learners with an introduction into how JES3plus is initialized at start up and how the initialization stream is used to identify system resources to JES3plus. Following on, the learner is shown what resources need to be defined to JES3plus such as spool data sets, checkpoint data sets, mains, storage, and buffers among others which are all vital to JES3plus’ processing functionality.

JES3plus – JES3plus for Application Programmers

Duration: 1hrs

In this course application programmers are shown how, through the use of job control language (JCL), JES3plus control statements can be used to provide special instructions to JES3plus to perform on their jobs during job processing. Also discussed is how deadline scheduling can be implemented to make the best possible use of available resources along with dependent job control which can be used to control the flow of jobs based on specific conditions.

View series

Introduction to Linux

Duration: 5hrs

The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed.

The Linux File System

Duration: 5hrs

The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed.

Editing with VI

Duration: 4hrs

The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided.

Linux Shell Programming

Duration: 4hrs

The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors.

Linux Operations

Duration: 4hrs

The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization.

View series

Labs – CICS (z/OS) 5.6

Duration: 4hrs

The CICS labs provide a range of exercises that can be run in your organization's mainframe training sandbox. Exercises focus on the tasks performed by CICS Administrators and Operators that include displaying CICS resources, system configuration and extracting and analyzing CICS statistics and performance data from SMF.

Labs – Db2 (z/OS) 12

Duration: 4hrs

The Labs - Db2 12 for z/OS provide a range of simulations and exercises, the latter of which can be run on your organization's mainframe training sandbox. Initial exercises focus on operational aspects of Db2 including the starting and stopping, of Db2 on z/OS. It then moves to commands used to display Db2 structures and content, and methods used to gather Db2 data that can be subsequently used to resolve Db2 system and performance issues. The last exercise concentrates on using SQL predominantly to create a working database, so, the creation of table spaces, tables, indexes, keys, as well as the loading of data into tables.

Labs – COBOL (z/OS) – COBOL Basics

Duration: 10hrs

The Labs – COBOL (z/OS) – COBOL Basics course provides a range of exercises that can be run in your organization’s mainframe training sandbox. Initial exercises focus on compiling, binding and executing existing COBOL programs, and then move to creating basic COBOL code used to display formatted output.

Labs – COBOL (z/OS) – COBOL and VSAM Data Set File Processing

Duration: 4hrs

The Labs – COBOL (z/OS) – COBOL and VSAM Data Set File Processing course provides a range of exercises that can be run in your organization’s mainframe training sandbox. Exercises in this course focus on copying data into a VSAM data set, and then for part of that data to be updated.

Labs – COBOL (z/OS) – COBOL and Sequential Data Set File Processing

Duration: 8hrs

The Labs – COBOL (z/OS) – COBOL and Sequential Data Set File Processing course provides a range of exercises that can be run in your organization’s mainframe training sandbox. Exercises in this course focus on accessing records from a sequential data set and performing various actions with that data.

Labs – COBOL (z/OS) – Working with COBOL Data

Duration: 8hrs

The Labs – COBOL (z/OS) – Working with COBOL Data course provides a range of exercises that can be run in your organization’s mainframe training sandbox. Exercises in this course are more difficult than those from the Labs – Basic course, focusing on a range of arithmetic operations, calling programs and passing information between programs.

Labs – IMS

Duration: 0hrs

COMING SOON!

Labs – Introduction to z/OS Security

Duration: 0hrs

COMING SOON!

Labs – JCL (z/OS) 2.5

Duration: 4hrs

These labs provide a range of JCL exercises that can be run in your organization's mainframe training sandbox. Initial exercises focus on basic coding and resolving syntax errors and increase in complexity throughout the exercises.

Labs – JES2 (z/OS) 2.5

Duration: 3hrs

The Labs - JES2 (z/OS) labs provide a range of exercises that can be run in your organization's mainframe training sandbox. Initial exercises focus on entering JES2 commands to manage batch jobs and SYSOUT. In later modules, more advanced JES2 tasks associated with spool offload, JES2 checkpointing and JES2 initialization are presented.

Labs – SDSF (z/OS) 2.5

Duration: 3hrs

The SDSF labs provide a range of exercises that can be run in your organization's mainframe training sandbox. Initial exercises focus on configuring SDSF screen defaults and then move on to managing batch jobs and their output using a number of SDSF options. Several exercises relating to searching and saving data from system and user logs are also provided. The last two exercises are for more experienced personnel and deal with JES2 initiator manipulation, and locating data that can assist if there is a JES2 resource shortage.

Labs – TSO/ISPF (z/OS) 2.5

Duration: 4hrs

The TSO/ISPF labs provide a range of exercises that can be run in your organization's mainframe training sandbox. Initial exercises focus on modifying TSO session defaults and allocating data sets, while later modules deal with copying and manipulating mainframe data using ISPF panels and utilities.

Labs – z/OS Operator (z/OS) 2.5

Duration: 2.5hrs

The z/OS Operator labs provide a range of exercises that can be run in your organization's mainframe training sandbox. Exercises focus on the major tasks performed by the z/OS Operator including responding to system messages, displaying system activity and identifying the status of hardware and software.

Labs – z/OS System Programmer – Basics (z/OS) 2.5

Duration: 5hrs

These mainframe exercises provide scenarios where you are required to perform tasks and resolve simple and more complex z/OS-related problems, using your organization's training sandbox.

Labs – z/OS UNIX (z/OS) 2.5

Duration: 3.5hrs

These z/OS UNIX labs allow the learner to interact with the z/OS UNIX system using several popular interfaces. Tasks include creating and modifying z/OS UNIX files and directories, displaying z/OS UNIX activity and running an interactive script.

View series
View series

Introduction to Project Management and PMBOK® Guide-Sixth Edition

Duration: 3hrs

The Introduction to Project Management and PMBOK® Guide-Sixth Edition course describes what projects are, and how they are part of every day life. It looks at the main components of a project and how they can be broken down.

Project Integration Management

Duration: 1hrs

This course is suitable for anyone who needs to develop an understanding of Project Integration Management and Change Control principles aligned to the PMBOK® Guide-Sixth Edition.

Project Scope Management

Duration: 2hrs

This module is suitable for anyone who needs to develop an understanding of Project Scope Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Schedule Management

Duration: 13hrs

This course is suitable for anyone who needs to develop an understanding of Project Time Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Cost Management

Duration: 5hrs

This course is suitable for anyone who needs to develop an understanding of Project Cost Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Quality Management

Duration: 1hrs

This course is suitable for anyone who needs to develop an understanding of Project Quality Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Resource Management

Duration: 1hrs

This course is suitable for anyone who needs to develop an understanding of Project Resource Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Communications Management

Duration: 1hrs

This course is suitable for anyone who needs to develop an understanding of Project Communications Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Risk Management

Duration: 5hrs

This course is suitable for anyone who needs to develop an understanding of Project Risk Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Procurement Management

Duration: 1hrs

This course is suitable for anyone who needs to develop an understanding of Project Procurement Management principles aligned to the PMBOK® Guide-Sixth Edition.

Project Stakeholder Management

Duration: 1hrs

This module is suitable for anyone who needs to develop an understanding of Project Stakeholder principles aligned to the PMBOK® Guide-Sixth Edition.

CAPM Practice Test for PMBOK® Guide-Sixth Edition

Duration: 3hrs

This practice test will help you prepare for the Certified Associate in Project Management (CAPM) or the Project Management Professional (PMP) certifications. It is important to note that both certifications have additional requirements with regards to project management experience and education. This test contains 150 multiple choice questions with detailed feedback. The feedback is shown after you answer each question. Each time you take this test you will be presented with a different set of questions drawn from a pool of over 200 questions. There is no time limit on this test as you are allowed to view the feedback as you answer each question. Note: The PMI CAPM Exam is a computer-based test with 150 multiple choice questions, 15 of which are unscored. Test-takers have three hours to complete the PMI CAPM exam.

View series

Quantum – Easy Introduction to Quantum Computing – Expert Videos

Duration: .75hrs

In this expert video, Quantum computing is explored from its inception to its current state and future possibilities. The presenter delves into the specifics of what Quantum computing is and clears up common misconceptions about its purpose. The video also provides an overview of the prominent hardware and software providers in the Quantum computing space and highlights their current offerings. Additionally, the video showcases various practical applications of Quantum computing, which helps to explain the hype surrounding this exciting technology.

Quantum – Installing Qiskit on IBM LinuxONE – Expert Videos

Duration: .75hrs

This expert video delves deeper into the capabilities of Qiskit, an open-source quantum computing software development kit. The instructor provides an in-depth explanation of its functionality before demonstrating the process of downloading and installing Qiskit onto a LinuxONE server. This is done in order to prepare for the execution of a quantum program within the IBM Quantum environment.

Quantum – Quantum Computing and Qiskit

Duration: 5hrs

This course begins by looking back through history to see how calculation has evolved, and the advancements in technology and tools, which have lead us to where we are today - quantum computing. You will then see how Qiskit is used for working with quantum computers, how it is installed, and the process of connecting it to a backend simulator or real quantum computer. You will also look at the Qiskit community and how you can contribute to Qiskit's open source code. Finally, you will discover how algorithms have evolved and the role quantum algorithms will play in the future.

View series

ISPF (z/OS) – TSO and ISPF Basics 2.5

Duration: 3hrs

The TSO and ISPF Basics course explains the purpose of TSO and ISPF, and describes how each of these products is accessed. Common TSO commands are presented, providing scenarios where they are used. ISPF screen navigation using commands, and the ISPF Action Bar, are also discussed.

ISPF (z/OS) – Configuring ISPF for General Use 2.5

Duration: 3hrs

The Configuring ISPF for General Use course explains how ISPF product defaults are displayed, and how they can be modified to suit the user's requirements. The use of function keys is discussed as well as the methods used to create, and navigate to, multiple logical ISPF screens.

ISPF (z/OS) – Managing Data Files and Definitions with ISPF/PDF 2.5

Duration: 5hrs

The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects.

ISPF (z/OS) – Displaying and Manipulating Data in View and Edit Mode 2.5

Duration: 3hrs

The Displaying and Manipulating Data in View and Edit Mode course explains how to access a data set in View and Edit mode, and explains the difference between these modes. It then describes how to scroll and navigate in Edit mode, and introduces the common edit line commands.

ISPF (z/OS) – Using Edit Primary Commands 2.5

Duration: 3hrs

The Using Edit Primary Commands course describes the commands used to display and update data in ISPF edit mode. This function allows you to perform multiple changes to all, or part of the data, being edited. This course also discusses how data from an edit session can be saved, exited without saving, and copied to another data set or partitioned data set member.

ISPF (z/OS) – Advanced ISPF Data Editing Techniques 2.5

Duration: 3hrs

The Advanced ISPF Data Editing Techniques course describes how various tabbing facilities can be used in an ISPF edit session to automatically place the cursor in specific columns, allowing for easier bulk data entry. It also discusses how boundaries can be defined to the data being edited and looks at edit data profile attributes, and how they can be updated.

ISPF (z/OS) – Advanced – Tips and Tricks – TSO 2.5

Duration: 2.5hrs

This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent versions of z/OS.

View series

SDSF – Introduction and Basic Concepts 2.5

Duration: 3hrs

The SDSF - Introduction and Basic Concepts course describes the purpose of SDSF, providing details on how SDSF is accessed and how you interact with it.

SDSF – Working with SDSF Data 2.5

Duration: 4hrs

The SDSF - Working with SDSF Data course explains how data is located in SDSF screens and the use of filtering commands to display specific information. A description of SDSF logs and how they are used is also presented.

SDSF – Operations 2.5

Duration: 1hrs

The SDSF - Operations course discusses how SDSF is configured and initialized. It looks at the commands used to start and stop SDSF servers and the use of the MODIFY command to update server attributes and invoke tracing and debug facilities.

SDSF – Job Activity Basics 2.5

Duration: 3hrs

The SDSF - Job Activity Basics course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands.

SDSF – Controlling and Managing Jobs 2.5

Duration: 3hrs

The SDSF - Controlling and Managing Jobs course describes how a submitted job uses its job class to determine the type of initiator that will select it, and shows how job class attributes can be modified. SDSF actions used to start, hold, and terminate batch jobs and started tasks, is also presented.

SDSF – Advanced Job Management and Monitoring 2.5

Duration: 3hrs

The SDSF - Advanced Job Management and Monitoring course describes how the SDSF MAS panel is used to display MAS member status and attributes. Commands used to display MAS member and JES2 statistics are presented as well as commands used to control MAS member activity. Various SDSF panels, used to obtain in-depth job analysis information, are examined, describing how they can be used to determine performance or aid in job resolution.

SDSF – Using SDSF to Display and Control Job Output 2.5

Duration: 3hrs

The SDSF - Using SDSF to Display and Control Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether.

SDSF – Using SDSF to Display and Control Printers 2.5

Duration: 3hrs

The SDSF - Using SDSF to Display and Control Printers course shows how to display and modify printer attributes and manipulate printer activity.

SDSF – System Health and Managing JES2 Resources 2.5

Duration: 3hrs

The SDSF - Using SDSF to Manage System Resources and Devices course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages.

SDSF – Using SDSF to Work with System Information and Devices 2.5

Duration: 4hrs

The SDSF - Using SDSF to Work with System Information and Devices course describes how to display the contents of spool volumes, and manage spool volume availability. It explains how a spool offload is performed when data needs to be moved from spool devices. Tasks associated with displaying and managing JES2 nodes and lines is presented, and the process of obtaining a wide range of system information and defaults is also covered.

SDSF – Using SDSF to Perform Advanced System Monitoring 2.5

Duration: 3hrs

The SDSF - Using SDSF to Perform Advanced System Monitoring course describes SDSF panels that system programmers can use to analyze storage and address memory information. It also discusses how key system libraries and their attributes can be displayed using various SDSF panels. This information can assist systems programmers with analyzing and diagnosing information that may be affecting the performance of workloads and availability of the system.

SDSF – Advanced – Tips and Tricks 2.5

Duration: 1hrs

This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS.

View series

RACF – Introduction 2.5

Duration: 3hrs

This course introduces the learner to IBM's RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF's interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.

RACF – Defining and Managing Users in RACF 2.5

Duration: 4hrs

This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.

RACF – Managing RACF Groups and Administrative Authorities 2.5

Duration: 3hrs

This course follows on from the RACF - Defining and Managing Users in RACF course describing how users can be connected to Group profiles and can be assigned special privileged access.

RACF – Protecting Data Sets Using RACF 2.5

Duration: 3hrs

This course describes how RACF is used to define access to z/OS data sets. Information on the profiles used to provide this access is also discussed in detail.

RACF – Protecting General Resources Using RACF 2.5

Duration: 4hrs

This course describes how RACF is used to define access to system resources such as DASD and tape volumes, load modules (programs), and terminals. Details of the profiles used to provide access to these items is also discussed in detail.

RACF – Managing Digital Certificates 2.5

Duration: 3hrs

In this course you will see how encryption keys are used to securely manage data, and the standards that enforce encryption protocols. You will be introduced to various types of certificates and see how data that is stored in them. From a z/OS perspective you will see how IBM's Digital Certificate Access Server (DCAS) provides password free access to that environment using a certificate. Commands used to generate and manipulate digital certificates, and key rings is discussed in detail.

RACF – RACF and z/OS UNIX 2.5

Duration: 3hrs

This course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.

RACF – For System Programmers 2.5

Duration: 3hrs

This course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.

RACF – For Auditors 2.5

Duration: 4hrs

This course describes the various types of data center audits and discusses the role of an internal auditor when performing a RACF audit. It expands this to look at the general steps to ensure that RACF managed security is aligned with both organizational security standards, and external compliance regulations. RACF auditor privileges are discussed in detail describing how audit information is stored and the commands used to request the capture of specific events. The type of data that can be unloaded from SMF, and the RACF database, is explained along with details on how ICETOOL can be used to process this information to create audit reports.

View series

CA-ACF2® – Introduction
Duration: 4hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® – Defining Environment Controls
Duration: 5hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® – Protecting System Access
Duration: 5hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® – Protecting Data Integrity
Duration: 5hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® – Protecting General Resources
Duration: 5hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® – Maintaining ACF2
Duration: 4hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

CA-ACF2® For Auditors
Duration: 5hrs

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

View series

z/VM – Introduction and Concepts z/VM 7.3

Duration: 3hrs

The z/VM - Introduction and Concepts course describes how virtualization, and in particular z/VM, has become more popular in Data Centers. It explains the benefits of virtualization and some of its challenges, and describes how virtualization is used in the cloud. Content then focuses on z/VM describing how this operating system supports virtualization.

z/VM – System Initialization and Shutdown z/VM 7.3

Duration: 4hrs

The z/VM - System Initialization and Shutdown course examines the processes used for z/VM start-up and shutdown.

z/VM – Monitoring and Controlling z/VM Operations z/VM 7.3

Duration: 5hrs

The z/VM - Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources.

z/VM – Managing Guest Operating Systems z/VM 7.3

Duration: 4hrs

The z/VM - Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM. This includes the Conversational Monitor System (CMS), which is the default guest operating system that comes with z/VM. You will also look at the commands used to IPL, pause, restart, and shut down a guest operating system, and how to IPL the system automatically and manually.

z/VM – Managing CMS Files z/VM 7.3

Duration: 4hrs

The z/VM - Managing CMS Files course describes how to create lists of CMS files from which you can delete and rename files, and copy and compare their contents. You will also see how CMS files can be sent to other users, and how they are saved on the user's disk after transmission. You will also see how the XEDIT utility can be used to add data to a CMS file.

z/VM – Identifying and Resolving z/VM Problems z/VM 7.3

Duration: 5hrs

The z/VM - Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also discussed.

View series

VSAM – Introduction to VSAM z/OS 2.5

Duration: 1hrs

This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure.

VSAM – Defining, Altering, and Deleting VSAM Data Sets z/OS 2.5

Duration: 3hrs

This course describes how VSAM data sets are created using the IDCAMS Utility, or by using JCL statements. It also discusses how alternate indexes on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors.

VSAM – Working with VSAM Data Sets z/OS 2.5

Duration: 3hrs

This course discusses various methods for displaying, and printing all, or partial, data from a VSAM data set. It also describes how IDCAMS can be used to copy VSAM data and introduces several other products used to manage VSAM data sets.

VSAM – Managing VSAM Data z/OS 2.5

Duration: 3hrs

This course explains how VSAM data can be configured, allowing it to be shared by jobs, TSO users, UNIX processes and started tasks. It also addresses recovery options available when VSAM data is shared. A detailed explanation of parameters affecting VSAM performance is covered as well as the types of utilities used to capture VSAM performance statistics.

VSAM – Advanced – Tips and Tricks z/OS 2.5

Duration: .5hrs

This course contains many IDCAMS utility tips, tricks, techniques, and best-practice items associated with VSAM data.

View series

z/OS – Concepts 2.5

Duration: 4hrs

The z/OS Concepts course describes the evolution of mainframe enterprise computing and provides descriptions of the major components that comprise today's z/OS environment.

z/OS – Managing and Processing z/OS Data 2.5

Duration: 4hrs

The Managing and Processing z/OS Data course describes how I/O, which is the reading and writing to external devices such as disks, tape, printers, and networks, is performed in a z/OS environment. It then discusses the various z/OS-related resources that can be shared and the role of workload management in prioritizing workloads.

z/OS – Initializing and Terminating the z/OS System 2.5

Duration: 4hrs

The z/OS - Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system start-up and shutdown, describing the most common commands and operator responses.

z/OS – Displaying z/OS System Activity 2.5

Duration: 4hrs

This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices.

z/OS – Advanced z/OS Monitoring Facilities 2.5

Duration: 4hrs

This course provides an overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS as well as a description on how SMF data is created and managed. This course also discusses the need for message suppression and describes how this is achieved.

z/OS – Identifying z/OS System Problems 2.5

Duration: 5hrs

The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.

z/OS – Removing Tasks from the z/OS System 2.5

Duration: 3hrs

This course describes the processes and commands required to remove tasks, users, and batch jobs from a z/OS system.

z/OS – Techniques for Handling General z/OS Problems 2.5

Duration: 3hrs

This course introduces several techniques and processes used to assist with resolving z/OS system problems.

z/OS – Advanced – Tips and Tricks 2.5

Duration: 2hrs

This course contains many z/OS-related tips, tricks, techniques, and best practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.4 and z/OS 2.5.

View series

Courses marked with "★" are available to clients with Enterprise licenses only.

Note: these elearning courses are online, on-demand and self-paced. They are accessed via the MyInterskill LMS or via your organization's LMS. Interskill licenses access to all the courses for a year. Courses are not available individually.