Course Catalog
Below is a complete list of all courses grouped by curriculum. All courses are self-paced and can be taken at anytime and in any order. There are no schedules and you may take courses multiple times within your contract period. Courses and assessments are accessed by students online 24/7 via our Learning Management System(LMS). In addition to these courses, we also offer assessments, Learning Plans and guidance by one of our Learning Consultants. The entire package of courses, assessments and learning plans is offered as a bundle for one low price per student. We do not sell individual courses. Be sure to check out our coming soon courses and recently released courses, which are also included with your purchase.
Mainframe Subject Areas
» Assembler
Course Title | Duration | Description |
![]() |
5 | The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability. |
![]() |
7 | The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed. |
![]() |
5 | The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use. |
![]() |
8 | The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings. |
![]() |
5 | The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution. |
![]() |
4 | The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution. |
» Blockchain
Course Title | Duration | Description |
![]() |
4 | The Blockchain Fundamentals course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network. |
» BMC
Course Title | Duration | Description |
CONTROL-D Series |
||
7 | The CONTROL-D course introduces the concepts, facilities, and use of the BMC Control-D z/OS report distribution product. It discusses how standard reports can be analyzed, split, copied, distributed, printed, and viewed by Control-D, and the facilities available for backing up and archiving system reports and output. | |
CONTROL-M Series |
||
4 | The Introduction to CONTROL-M Scheduling course introduces the BMC Control-M Scheduling Product for z/OS systems. It describes how schedules and calendars are created and applied, and how jobs can be defined to these schedules to be automatically processed as required. | |
4 | The Monitoring the CONTROL-M Scheduling Environment course describes the use of the Control-M for z/OS scheduling package's monitoring and reporting facilities. It describes how jobs and schedules can be monitored and maintained through the Control-M online facilities and through standard Control-M utilities. It also shows some of the standard reporting utilities and describes how they can be used and executed. |
» C Programming
Course Title | Duration | Description |
1 | This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment. |
» CA Technologies
Course Title | Duration | Description |
CA 1 Series |
||
5 | The CA 1® Tape Management - Using Tape Media course describes the use of the CA 1® Tape Management system, the online facility and its uses, and the standard daily maintenance processing required by CA 1. | |
5 | The CA 1® Tape Management - Identifying and Resolving Media Problems course describes the structure of the CA 1 Tape Management system, its chaining process, AIVS and tape stacking facilities, problem determination, and the utilities available for correcting structural problems and reporting. | |
CA OPS/MVS Series |
||
5 | The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided. | |
5 | The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided. | |
5 | The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation. | |
5 | The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed. | |
4 | The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed. | |
CA SYSVIEW Realtime Performance Management Series |
||
4 | The CA SYSVIEW® Performance Management Overview course introduces the CA SYSVIEW Performance Management Overview product. It describes the basic concepts and reviews the toolkits that are available. It also explains the methodologies of data collection incorporated by CA SYSVIEW PM and the basic monitoring screens. Finally, it looks at the product's implementation, components, and interfaces. | |
5 | The CA SYSVIEW® Performance Management Administration and Security course introduces the use and administration of CA SYSVIEW PM. It describes system, MQseries, and CICS monitors and their uses, and the various logging collection and interface tasks. It also explains how security is defined for administrators, groups, and users. | |
1 | The CA SYSVIEW Performance Management Implementation course provides an overview of the CA SYSVIEW PM components. It also shows how to install CA SYSVIEW PM, its LMP keys, and optional interfaces. | |
CA 7 Workload Automation Series |
||
4 | This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions. | |
6 | This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7. | |
6 | This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes. | |
4 | This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting. | |
5 | This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided. | |
CA 11 Workload Automation Series |
||
4 | The Workload Automation Restart Option for z/OS Schedulers Overview course introduces the components, functions, and capabilities of CA 11, and describes how job information is stored and processed by this product. | |
4 | This course looks at the interaction that users have with CA 11 in order to determine the status and attributes of job information stored in the CA 11 database. It also identifies how CA 11 data can be used for generating reports. Common online commands and batch generation programs are discussed in detail, while the last module focuses on possible CA 11 problems and resolution and includes an overview of backup and recovery strategies associated with CA 11. | |
CA Jobtrac Job Management Series |
||
4 | The CA Jobtrac™ Job Management course introduces the CA Jobtrac Job Management product for z/OS. It describes the basic components that are used to schedule jobs in the z/OS environment and how to access them. It discusses how calendars are defined and used, and how schedules can be monitored through online facilities. It also discusses the more advanced scheduling capabilities of CA Jobtrac JM. | |
CA Endevor Change Manager Series |
||
6 | The CA Endevor™ Software Change Manager Introduction and Basic Usage course provides an overview of change management practices and describes the role that CA Endevor SCM plays. A general description of CA Endevor SCM configuration defaults is provided along with details of foreground and batch processing tasks that can be performed. | |
5 | The CA Endevor™ Software Change Manager Package Processing and Facilities course describes the purpose of packaging and how it is performed in foreground and batch modes. A comparison of functions available using CA Endevor SCM Quick Edit and the CA Endevor SCM ISPF Interface is discussed. The Query facility is also described, along with how to use the Automated Configuration Management data. | |
CA Easytrieve Report Generator Series |
||
9 | The CA Easytrieve® Report Generator course explains how reports are produced by using the CA Easytrieve Report Generator language. It details the structure of an CA Easytrieve program, including the Activity and Report sections. It also explains the basic commands used in the CA Easytrieve programming language to manipulate data for reporting, and the available report types. | |
CA Netmaster Network Management for TCP/IP |
||
12 | This course requires a familiarity with OS/390 networking concepts and facilities; familiarity with TCP/IP and SNMP; familiarity with ISPF and TSO; and some knowledge of basic S/390 product implementation techniques, such as SMP/E is desirable. After completing this Topic, the student will have an understanding of Product Configuration; discovery of Network Resources; monitoring and control of network resources; IP connection and general network diagnosis; and using the web to access capacity planning reports. |
» CICS v5.3
Course Title | Duration | Description |
CICS TS Operations Series |
||
![]() |
4 | The CICS TS - Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated. |
![]() |
3 | This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered. |
![]() |
6 | The Controlling CICS Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS. |
CICS TS Programmers Series |
||
![]() |
6 | The CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product. |
![]() |
6 | The CICS Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas. |
![]() |
4 | This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with DB2. |
![]() |
4 | This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues. |
![]() |
4 | This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them. |
![]() |
3 | This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS. |
![]() |
6 | The CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment. |
![]() |
2 | This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps. |
![]() |
3 | This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery. |
![]() |
4 | The Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces. |
» Cloud Computing
Course Title | Duration | Description |
![]() |
5 | The Cloud Computing for Data Centers course discusses the evolution of cloud computing and provides you with sources for obtaining additional cloud skills and knowledge. The attributes, and pros and cons of various cloud computing services is supplied and a description of in-house and outsourced cloud deployment models is provided. The final module uses the skills and knowledge you have attained, to create a business case and project plan for a cloud computing project. |
» COBOL Programming
Course Title | Duration | Description |
![]() ![]() |
6 | The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions. |
![]() ![]() |
4 | The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways. |
![]() ![]() |
6 | The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index. |
![]() |
5 | The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program. |
![]() |
4 | The IBM COBOL for z/OS course is designed for learners with a basic understanding of generic COBOL. It examines the non-standard implementations of COBOL in COBOL for z/OS. It also looks at compiling COBOL in z/OS, and accessing IBM subsystems such as CICS and DB2. Finally, it explores the importance of using Language Environment. |
![]() |
3 | The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained. |
» Data Analysis, Analytics, and Machine Learning Curriculum
Course Title | Duration | Description |
![]() |
4 | This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organisations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data. |
4 | This course is designed for those working with organisations looking to implement Machine Learning solutions. It is also of benefit for those looking to implement Spark on z/OS. It begins by explaining what Machine Learning is, how it works, and how organisations can benefit from it. The course then focuses on IBM's Machine Learning for z/OS solution, describing its features and components. In the final course, a description of Apache Spark and how it is used in a Machine Learning solution on a z/OS system, is presented. |
» Database - DB2 v11
Course Title | Duration | Description |
DB2 Operations SeriesNote: DB2 v10 is also available. |
||
![]() ![]() ![]() |
5 | The DB2 Fundamentals course describes what DB2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with DB2, is provided along with details on how it is used with SPUFI. |
![]() |
4 | The Managing DB2 Operations course looks at DB2 from an Operations viewpoint, describing DB2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of DB2 components are discussed as well as the facilities associated with backup, recovery and restart. |
DB2 - Database Management System Series |
||
![]() ![]() |
4 | The Introduction to RDBMSs and DB2 course describes from a Database Administrator's (DBA) viewpoint how DB2 is used and the types of DB2-related tasks that the DBA performs. The course also looks at DB2's system configuration requirements and how it is implemented in a z/OS environment. |
![]() ![]() |
6 | The Manage Data Definitions with DB2 course describes how SQL is used to define a DB2 database and its associated objects. It looks at SQL statement syntax and the methods used to invoke SQL statements. |
![]() ![]() |
4 | (Previously titled Manage Data with DB2 SQL in the v10 Curriculm) The DB2 SQL Fundamentals course looks at some of the more common SQL statements used by programmers when starting out. It addresses the code used to obtain DB2 table data, sort it, as well as methods used for inserting, deleting, updating and merging table data. |
![]() |
4 | The Advanced DB2 SQL course discusses some of the more advanced SQL code used to manipulate table data. Various methods used for joining tables is presented, along with examples of SQL statements and subqueries used to filter data results. |
![]() |
6 | The Create and Maintain DB2 Programs course describes how SQL is invoked from an application program and the interaction that can occur between the application program and DB2. This course also discusses how a DB2 COBOL Program is created. |
![]() |
3 | The DB2 Stored Procedures course describes how stored procedures are used and the platforms on which they can be implemented. The benefits derived from using stored procedures are discussed as well as security implications associated with them. |
![]() |
5 | The Optimize DB2 Application Performance course describes the methods used by DB2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyse their effectiveness. |
» Data Center Storage Management
Course Title | Duration | Description |
![]() |
5 | This course introduces the learner to data center storage, how it has evolved and the direction it is taking. The initial module also discusses the role of the Storage Administrator and where this person can obtain certification, training and general information. The remainder of the course focuses on disk and tape systems describing how they have evolved, how they are used to store data, and various configurations. |
![]() |
4 | This course describes the common configurations when implementing networked data storage, and includes information relating to cloud based storage structures. An overview of the monitoring and management tasks performed by the Storage Administrator are covered, focusing heavily on performance and capacity aspects. Details on using the ICKDSF program in z/OS, z/VSE and z/VM environments for DASD initialization and other administration tasks, is also covered. |
![]() |
6 | This course describes today's data storage needs and the role of various DFSMS components in managing that data. It looks at data management rule creation and the role that DFSMShsm plays in ensuring sufficient space is made available. |
» DevOps
Course Title | Duration | Description |
![]() ![]() |
2 | The DevOps Fundamentals course discusses how today's successful business strategies evolve around continuous improvement practices, and how implementing a DevOps environment can partly achieve this goal. Pre and post DevOps scenarios are examined, looking at the structure and characteristics of this environment. Several DevOps-related surveys are examined as well as a number of case studies involved with DevOps adoption. Cultural changes associated with implementing DevOps are discussed, including challenges in this area. Finally, a wide range of commonly used DevOps-related automation tools and their purpose are presented. |
» Disaster Recovery
Course Title | Duration | Description |
![]() |
3 | This course begins by immersing the learner in a full scale disaster, getting them to think about all the elements involved in not only recovering data, but also ensuring that the overall business runs as per expectations. It then describes what business continuity is, citing well known events, and where disaster recovery fits in. The course is then extended to explain common business continuity strategies and looks at standards, in particular ISO22301, to see how current standards tackle this important facet of business life. |
» IBM Explorer for z/OS
Course Title | Duration | Description |
![]() |
2 | The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of z/OS and Resource perspectives, and the related views used to display and manage z/OS data. |
» IBM Mainframe Communications
Course Title | Duration | Description |
![]() |
5 | The IBM Mainframe Communications Concepts course provides an overview of traditional SNA and TCP/IP communication protocols and the logical and physical components associated with them. |
![]() |
5 | The VTAM commands course discusses the use of commands to display the status and attributes of VTAM resources. An explanation of the processes used to start, activate, deactivate and stop VTAM resources is also provided. |
![]() |
5 | The Mainframe TCP/IP Commands course describes how TCP/IP runs on the mainframe and provides several scenarios where TCP/IP daemon, client application and server application commands are used. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM. |
» IBM Power Series - AIX
Course Title | Duration | Description |
5 | This course is designed to provide a system administrator with no prior AIX experience an introduction to the background and the fundamental components of AIX. The course covers essential knowledge including concepts, system access and management, and commonly used administrative commands. | |
6 | This course is designed to provide existing UNIX administrators a path to understanding the critical differences with AIX. Topics examined include the essential components of AIX, system management, performance improvements, and AIX system troubleshooting. | |
4 | This course is designed to provide the learner with an understanding of the tasks involved in creating and managing a virtualized AIX environment, and assumes the learner has a basic understanding of AIX. Topics covered include the fundamentals of virtualization in AIX environments, an examination of the Virtual I/O Server, and the use of management devices such as the HMC, IVM, or SDMC. |
» IBM Power Series - IBM i
Course Title | Duration | Description |
IBM i Fundamentals Series |
||
5 | The IBM i Fundamentals course explains the origins of the IBM i system and describes the configuration of hardware and software needed to support it. It discusses the types of devices that can be used to access the IBM i system and the interfaces most commonly used. Examples are also provided of several products commonly used to perform IBM i administration tasks. | |
5 | The IBM i Fundamentals Series provides learners with an introduction into IBM i from an operations point of view. The courses will familiarize you with the IBM Systems Director Navigator for i, IBM i navigator, and 5250 emulation interfaces and provide examples of some of the tasks that can be performed using them. | |
5 | The Monitoring and Managing IBM i Workloads course provides an overview of the processes involved in monitoring, managing and controlling IBM i workloads and printing. | |
IBM i System Administration Series |
||
5 | This course introduces the learner to the core tasks performed by the IBM i System Administrator, and includes information on system configuration, security, backup, recovery, performance monitoring and capacity planning. The use of third-party and IBM products to achieve these tasks is also discussed. The Management Central software, which is used to monitor and control IBM i system activity and performance is also explained in detail. | |
4 | This course focuses on the security-related tasks undertaken by the IBM i System Administrator. As well as discussing how overall security requirements are identified, it also delves deeper to describe how IBM i system security relating to user, system and resource components are created and managed. An overview of IBM i system auditing requirements, implementation and reporting is also provided. | |
5 | This course highlights the importance of IBM i system journaling and describes the type of data that can be captured using this feature. Tasks associated with displaying journal entries, implementing journals, managing journal activity, and recovering data from journals is discussed in detail. | |
3 | This course provides an overview of the levels of disk storage that are available on an IBM i system and how they can be configured for use. Information relating to speed, availability and data recovery features associated with IBM i disk storage are also discussed in detail. | |
4 | This course looks at logical partitioning and the benefits that can be gained from implementing this feature on your IBM i system. Details of the products that can be used to define partitions as well as the process itself is provided, and the management and performance of partitions is also discussed in detail. | |
IBM i Programming Fundamentals Series |
||
8 | The CL Programming course introduces programming that uses the iSeries Control Language (CL). It explains how to use the variables utilized in a CL program and control its processing. | |
4 | The CL Programming Functions and Messaging course describes the more advanced features of Control Language programming. It focuses on how to use CL message handling to monitor the correct execution of CL programs. | |
IBM i RPG Series |
||
6 | The RPG/400 Introduction explains the fundamental features and structure of a Report Program Generator (RPG) program. It also describes the concepts of RPG programming. | |
4 | The RPG/400 Coding course explains the fundamental Report Program Generator (RPG) operation codes that enable programmers to manage field values, perform numeric operations, and manipulate dates for retrieval and viewing. | |
4 | The RPG/400 Programming course explains how to use Report Program Generator (RPG) features to write reports. It also describes structured programming and how to affect the flow of control. | |
5 | The RPG/400 Workstation Programming Introduction course shows how to design and develop screen layouts and how the program can interact with the user to deliver and accept data. | |
6 | The RPG/400 Advanced Workstation Programming course shows how to use the standard IBM i tools to write and compile RPG/400 programs. This course also covers the design and use of dynamic databases in your program. | |
IBM i Query Series |
||
4 | The Database Basics and the Need for Query course describes the IBM Query for i sort, report and analyze capabilities providing examples on how IBM Query for i is used to create business reports. Basic concepts relating to database structure and the data that can be accessed by IBM Query for i are explained in detail. | |
6 | The Creating a Simple Query course begins by describing how database files are joined, enabling IBM Query for i to more easily reference data. This is followed by the identification of data that will be required by IBM Query for i and the subsequent coding required to extract that information. Details on options used to save the query and print, or display, the resulting report are also covered. | |
6 | The Advanced Query Features and Management course begins by looking at more complex capabilities associated with query definitions. It then moves into the management of queries, explaining how queries can be copied, modified, deleted, printed and run. The Data File Utility and its purpose are discussed, and finally a number of tips when managing queries are provided. | |
IBM i Application Programming Introduction Series |
||
3 | This course is intended for new programmers, with some existing operational knowledge of databases and the workings of the IBM i system, who will be writing programs which access the IBM i database. At the completion of the course the student will have a basic understanding of the IBM i system's data file specifications (DDS) for both Physical and Logical files. This course is not intended to teach the basic operations of IBM i system and its usage. |
» IBM System z and z/OS Fundamentals Mastery Test
Course Title | Duration | Description |
This group of courses and assessments prepares the student for the IBM System z and z/OS Fundamentals Mastery test. It examines entry level zEnterprise fundamental concepts, system programmer and other user role tasks. The test is applicable to those completing the recommended education or those who have recently moved into a zEnterprise environment. Once completed you may decide to schedule your exam with Pearson VUE(an external testing provider) |
||
4 | This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe. | |
6 | This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues. | |
1 | This assessment measures your general knowledge of the tasks performed by the system programmer. | |
6 | This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented. | |
1 | This assessment measures your general knowledge of the z/OS programming languages and processes associated with creating an executable module. | |
5 | The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured. | |
4 | The CICS TS - Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated. | |
4 | The Introduction to RDBMSs and DB2 course describes from a Database Administrator's (DBA) viewpoint how DB2 is used and the types of DB2-related tasks that the DBA performs. The course also looks at DB2's system configuration requirements and how it is implemented in a z/OS environment. | |
1 | This course introduces IBM WebSphere Application Server for z/OS. The course includes, the role of an application server and how WebSphere Application Server provides Web access to mainframe data | |
5 | This course provides the learner with basic information about WebSphere MQ on z/OS: features, functions and issues that differ from WebSphere MQ on other platforms. | |
5 | The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of data sets and how functions such as; copying, printing, renaming and deleting are performed on these objects. | |
7 | The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse and edit data within a data set. | |
1 | This assessment measures your general knowledge of the middleware products commonly used to facilitate z/OS online processing | |
3 | The JCL (z/OS) - Introduction to z/OS JCL course describes the purpose of Job Control Language (JCL) in a z/OS environment and describes the three most commonly used JCL statements: JOB, EXEC and DD. Details of common parameters associated with these statements, along with examples on how they are used, are also provided. | |
1 | The assessment is designed for IT staff who work with z/OS or the mainframe, and those preparing to take the IBM System z Entry Level for z/OS System Programmer Mastery Test. |
» Introduction to the IBM Environment
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() |
4 | This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe. |
6 | This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues. | |
![]() |
6 | This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented. |
» IMS (Information Management System)
Course Title | Duration | Description |
![]() ![]() |
5 | The Introducing IMS course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components and processing concepts. |
![]() ![]() |
5 | The IMS Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided. |
![]() |
5 | The IMS Database Manager course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations. |
» iSeries
Course Title | Duration | Description |
iSeries Introduction Series |
||
4 | The iSeries Concepts course describes how the iSeries operating environment is based around the concepts of objects. It introduces the object types and describes the standard control language command set that enables operators and programmers to work with them. | |
4 | The iSeries Security course describes how to manage and work with the iSeries objects. It explains how to secure objects so that only authorised users, operators, and programmers can access or modify information and security settings. | |
iSeries Operations Series |
||
1 | After completing this course, the student will be able to recognize keyboard and input keys, identify how to sign on and access options through commands and menus and recognize iSeries Navigator functions. | |
4 | The AS/400 Operations course explains how to issue iSeries Control Language (CL) commands which will monitor and control work on the system. | |
4 | The iSeries Operating Facilities course explains how to perform regular and critical tasks. This includes starting (initializing) and stopping (terminating) the system, monitoring to ensure that users have access, and performing backups and restores. | |
iSeries Programming Fundamentals Series |
||
4 | The CL Programming course introduces programming that uses the iSeries Control Language (CL). It explains how to use the variables utilized in a CL program and control its processing. | |
4 | The CL Programming Functions and Messaging course describes the more advanced features of Control Language programming. It focuses on how to use CL message handling to monitor the correct execution of CL programs. | |
5 | The Introduction to iSeries Programming Environment course describes the comprehensive programmer environment called PDM. It explores all the PDM facilities that will enable the learner to commence programming. | |
5 | The Introduction to iSeries Programming Facilities course introduces the utilities that are provided by the iSeries in addition to PDM to help programmers develop test data, create screen views, and maintain their source files. | |
iSeries Application Programming Introduction Series |
||
4 | The Introduction to Programming the iSeries course introduces the programming languages available on the iSeries. It explains the object types associated with them, and the data sources (objects) that programs can access. | |
3 | The Introduction to DB2/400 course introduces the two main DB2 file types, physical and logical files. It describes how to define and create them. | |
3 | The Introduction to Device Files course introduces display files and printer files. It explains how to define and create them. | |
iSeries Query Series |
||
10 | The Query For Users course describes the Query/400, the report writer that comes with the iSeries. It explains how the Query/400 can help users and programmers create simple reports without having to programmatically develop them. It also shows how to access information stored in DB2/400 tables. | |
iSeries RPG Series |
||
6 | The RPG/400 Introduction explains the fundamental features and structure of a Report Program Generator (RPG) program. It also descibes the concepts of RPG programming. | |
4 | The RPG/400 Coding course explains the fundamental Report Program Generator (RPG) operation codes that enable programmers to manage field values, perform numeric operations, and manipulate dates for retrieval and viewing. | |
4 | The RPG/400 Programming course explains how to use Report Program Generator (RPG) features to write reports. It also describes structured programming and how to affect the flow of control. | |
9 | The RPG/400 Workstation Programming course shows how to design and develop screen layouts. It also describes how to write an RPG program that can display information on the screen for a user to maintain. | |
Introduction to iSeries ILE Programming Series |
||
4 | The Integrated Language Environment course explains the concepts, structure, and benefits of the Integrated Language Environment (ILE). It describes how the iSeries enables the use of different programming languages, and how programs can be linked together into one optimized program by using ILE. | |
4 | The ILE RPG/400 course explains improvements to the iSeries RPG features and how to use them. It also provides an example program. | |
iSeries Subfile Programming Series |
||
3 | The Introduction to Subfiles course details the fundamentals of subfile programming, including its application and features. It also explains subfile keywords. | |
6 | The Input and File Load Subfiles course explains how to effectively design and create a subfile. It also describes how to program a subfile, which enables users to manage information. | |
6 | The Load by Page and Maintenance Subfiles course explains how to code by using the advanced subfile facilities to create high-quality and high-usability programs. |
» Java Programming
Course Title | Duration | Description |
1 | This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, DB2, and WebSphere. | |
3 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment. | |
7 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent. | |
3 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems. |
» JCL
(Job Control Language)
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() ![]() |
3 | The JCL (z/OS) - Introduction to z/OS JCL course describes the purpose of Job Control Language (JCL) in a z/OS environment and describes the three most commonly used JCL statements: JOB, EXEC and DD. Details of common parameters associated with these statements, along with examples on how they are used, are also provided. |
![]() |
5 | The JCL (z/OS) - Using Special Data Sets in Batch Jobs course examines how special data sets, such as generation data groups, tape data sets, and temporary data sets are referenced using JCL. It also describes how data sets can be concatenated in JCL and some of the reserved DD statement names and their uses. |
![]() |
3 | The JCL (z/OS) - Identifying and Resolving Batch Problems course examines the use of the COND parameter and the IF/THEN/ELSE JCL statement construct, showing how they can be used to control the flow of steps throughout a job. A list and description of common condition codes and abends is provided along with their causes and possible resolution. |
![]() |
4 | The JCL (z/OS) - Coding Procedures and JES2 Control Statement course demonstrates how to create JCL procedures. It also covers the use of override statements and symbolic substitution of values within a procedure. It examines how parameter values can be passed, and how backward references can be used between steps. Finally, it describes the use of the JES control statement in determining the environment that a job should run under, and the OUTPUT statement and its role in determining where output should be sent for printing. |
» JES
(Job Entry Subsystem)
Course Title | Duration | Description |
JES2 Concepts, Commands, and Application Series |
||
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() |
5 | This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology. A number of scenarios are presented that describe how JES2 devices are used, their possible statuses, and how jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes. |
![]() |
4 | This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status. |
![]() |
5 | This course builds from the previous and discusses some of the more commonly used JES2 commands used to manipulate initiator and printer resources and activity. A focus on the JES2 commands associated with modifying batch job attributes as they progress through the JES2 queues is also provided. The display and management of network-related JES2 components is also mentioned. |
![]() |
5 | This course provides you with examples of common JES2 job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues. Detailed information relating to the function of JES2 checkpoints, their placement, and attributes is provided along with steps required to resolve problems associated with this resource. |
![]() |
5 | This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources. |
JES3 Series |
||
9 | The JES3 Concepts and Commands course introduces the JES3 subsystem. It describes the JES3 input, main output, and expanded services available, and examines the commands used to start, display, maintain, and shut down the JES3 subsystem. |
» Linux
Course Title | Duration | Description |
![]() |
5 | The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed. |
![]() |
5 | The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed. |
![]() |
4 | The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided. |
![]() |
4 | The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors. |
![]() |
4 | The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization. |
» Mainframe Application Performance Curriculum
Course Title | Duration | Description |
1 | This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions. |
» PL/1 Programming
Course Title | Duration | Description |
![]() |
5 | The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language. |
![]() |
5 | The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions. |
![]() |
5 | The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions. |
![]() |
5 | The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language. |
» Rational Developer for System z
Course Title | Duration | Description |
![]() |
4 | This course introduces the learner to the IBM Rational Developer for System z (RDz) product describing the general tasks that can be performed using it, as well as its configuration and other features. A guide to RDz's GUI interface is provided including details on connecting to resources on a host system. |
![]() |
4 | This course describes the methods used to create, manage and maintain applications under RDz. It provides details on the benefits of projects and subprojects within RDz and the application tasks that can be performed within this structure. RDz testing and debugging capabilities are discussed in detail, in particular the zUnit testing framework, and the IBM Integrated Debugger. The final module addresses the RDz features that allow you to create applications for DB2, CICS and IMS. |
» Related Products
Course Title | Duration | Description |
6 | The CLISTS Introduction course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS. | |
6 | This course is intended for those looking to learn FOCUS for the purposes of data and report construction and maintenance. Before commencing this course you should have a good understanding of basic programming and database principles. | |
3 | This course is intended for Operators who will be responsible for monitoring/controlling HSM and programmers who will use HSM. Before commencing this course you will need a good knowledge of MVS and TSO/ISPF. | |
3 | The Parallel Sysplex course introduces the concepts of a z/OS Parallel Sysplex. It explores the different types of system configurations and the technical terms used to describe them. It also describes the basic steps and conditions required to set up a Parallel Sysplex environment. | |
![]() |
3 | The Virtual Tape Server (VTS) course introduces the student to the concepts, functions, and capabilities of a VTS and explains how a VTS operates. Information describing the VTS hardware and software components is provided including the commands used to monitor and maintain a VTS in the z/OS operating environment. |
4 | The System Managed Storage (SMS) course describes SMS and its uses. It provides examples of four SMS constructs and the four SMS routines. It also examines the ISMF panels for general SMS functions, the management of space and data availability, and the new JCL and IDCAMS keywords for SMS. |
» REXX (REstructured eXtended eXecutor language)
Course Title | Duration | Description |
![]() |
4 | The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program. |
![]() |
6 | The REXX Keyword Instructions course discusses the common keyword instructions used in REXX coding and describes how looping and execution control instructions are invoked. |
![]() |
6 | The REXX Built-In Functions course describes the standard built-in functions that are available with REXX. |
![]() |
6 | The REXX with z/OS and TSO/E course explains how REXX is used in TSO and z/OS environments. |
» SDSF (System Display & Search Facility)
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() |
8 | The SDSF Concepts and Operation course describes the purpose of SDSF, providing details on how it is accessed and how you interact with it. The course then explains how data is located and the use of filtering commands to display specific information. Details of SDSF initialization and shutdown are provided with solutions to common problems. Finally, a description of SDSF logs and how they are used is covered. |
![]() |
7 | The Using SDSF to Control Job Processing course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands. Control of overall batch job activity through the use of MAS, Scheduling Environments and Initiators is also discussed. |
![]() |
6 | The Using SDSF to Display, Manipulate and Print Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether. Details associated with displaying and modifying printer attributes and activity are also covered. |
6 | The Using SDSF to Manage System Resources and Devices course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages. Details associated with displaying and managing spool, and JES2 node and line activity are also explained. |
» Security (RACF & CA ACF2)
Course Title | Duration | Description |
Introduction to Mainframe Security Series |
||
![]() |
5 | This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered. |
CA ACF2 Security Server Series |
||
4 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
4 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
RACF Series |
||
![]() |
6 | The Defining Users to RACF course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users and groups system security access. |
![]() |
6 | The Protecting System Resources Using RACF course describes how RACF is used to define access to data sets. Details of the profiles used to provide access to general resources and UNIX resources is also explained. |
![]() |
4 | The RACF for System Adminstrators and Auditors course describes the skills needed to audit security access in an RACF controlled system. It includes setting up auditing options and interpreting audit data. |
» Service Oriented Architecture
Course Title | Duration | Description |
4 | This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption. |
» Tandem
Course Title | Duration | Description |
3 | The Introduction to Tandem course introduces the Tandem computing environment. It focuses on the key components and advantages of Tandem. | |
2 | The Advanced Command Language course explains how to enter TACL commands. It also describes some basic TACL commands. | |
1 | The Backup and Restore Utility course explains how to use the Tandem Backup and Restore utilities. It also explores the available Backup and Restore options. | |
1 | The Command Interpreter Monitor course explores the functions and process of Tandem CMON. | |
1 | The Communications Introduction course describes the use of the Tandem Communications Management Interface (CMI). It also explores the basic components of CMI and CMI commands. | |
1 | The Communications Subsystems course describes the Tandem 6100 communications subsystem. It details both hardware and software. | |
1 | The Distributed Systems Management course explores the Tandem DSM architecture and environment. It also describes some of the tools to manage it. | |
1 | The DSAP and DCOM Utilities course examines Tandem's Disk Space Analysis program (DSAP) and the Disk Compression (DCOM) program. It describes the function and commands of these programs. | |
3 | The File Utility Program course explains how to use Tandem's File Utility Program (FUP) to modify and manage files in the Tandem system. | |
1 | The Guardian Principles Advanced course provides an advanced view of how the Guardian operating system works. This includes descriptions of its architecture and processing. | |
1 | The Hardware course explores Tandem VLX and Cyclone hardware and peripherals. | |
1 | The Himalaya S-Series Range course explains the Tandem Himalaya S-Series Range hardware and peripherals. | |
1 | The Tandem Measure course describes how to collect and examine performance statistics by using Measure. | |
1 | The Mediacom course describes the functions of Mediacom and the advantages of using DSM/TC tape management. It also explains some common Mediacom commands. | |
2 | The Pathway course teaches the student about the Tandem Pathway application environment. It also describes the use of Pathway tools and commands. | |
2 | The Performance and Tuning course explores the concepts of Tandem performance tuning. It also describes the tools available, including Measure and Enform. | |
3 | The Peripheral Utility Program course explains how to use Tandem's Peripheral Utility Program (PUP) to manage peripheral devices or disks. | |
2 | The Remote Maintenance Interface course explains how to use Tandem's Remote Maintenance Interface (RMI). It also lists the commands that control the Tandem system. | |
1 | The Spoolcom course explores the concept of a spooler. It also describes how to control jobs and spooling by using Tandem's Spoolcom utilities. | |
1 | The Subsystem Control Facility course explores Tandem TLAM networks. It also explains the commands used to control them. | |
1 | The Tandem Security course introduces the Tandem System Security facilities. This includes Guardian and CMON concepts, and security user records. | |
5 | The Tandem Service Management Introduction course explains the client/server applications and software for the Himalaya S-Series Server. It also describes maintenance, service tools, and trouble-shooting. | |
3 | The Tapecom Utility course explains how to use the Tapecom utility. It also describes the commands to manage tapes on a Tandem system. | |
4 | The Transaction Application Language course explains the basics of the Tandem Application Language (TAL). It describes how to code TAL programs. It also explores program structure, syntax, and commands. | |
1 | The Transaction Monitoring Facility course explains how to use the Tandem Transaction Monitoring Facility (TMF) to monitor and manage applications. It also explains TMFCOM commands. | |
3 | The Viewpoint course describes the use of Viewpoint. It also explains Viewpoint operations and screen definitions. |
» Tivoli Workload Scheduler for z/OS
Course Title | Duration | Description |
![]() |
3 | The Understanding How Tivoli Workload Scheduler Processes Work course discusses the need for workload scheduling in today's enterprise organization, and provides general information describing how Tivoli Workload Scheduler processes jobs. |
![]() |
6 | The Monitoring and Managing the Tivoli Workload Scheduler for z/OS Environment course describes how Tivoli Workload Scheduler is used to monitor and manage batch processing flows. Details relating to job restart and recovery using this product, are also provided. |
![]() |
6 | The Scheduling with Tivoli Workload Scheduler for z/OS course explains how JCL is configured for the Tivoli Workload Scheduler environment and how job schedules are created. |
![]() |
4 | The Maintaining the Integrity of Tivoli Workload Scheduler for z/OS course describes the creation and modification of current plans and long-term plans and the backup and recovery associated with them. |
» TSO/ISPF (Time Sharing Option & Interactive Systems Productivity Facility)
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() |
5 | The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured. |
![]() |
5 | The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of data sets and how functions such as; copying, printing, renaming and deleting are performed on these objects. |
![]() |
7 | The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse and edit data within a data set. |
» Utilities
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
z/OS Batch Utilities Series |
||
![]() |
4 | This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail. |
![]() |
5 | This course looks at the IEBGENER, ICEGENER, IEBCOMPR, IEHLIST and DFSORT utilities and provides real-life examples describing how they are used to interrogate and modify data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail. |
VSAM Series |
||
![]() |
7 | This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors. |
» WebSphere
Course Title | Duration | Description |
![]() |
1 | This course introduces IBM WebSphere Application Server for z/OS. The course includes the role of an application server and how WebSphere Application Server provides Web access to mainframe data. |
![]() |
5 | This course provides the learner with basic information about WebSphere MQ on z/OS: features, functions and issues that differ from WebSphere MQ on other platforms. |
» Virtualization (z/VM)
Course Title | Duration | Description |
Version 6.3 | ||
![]() |
6 | The z/VM Concepts, System Initialization and Shutdown course describes how virtualization, and in particular z/VM, has become more popular in Data Centers and examines the processes used for z/VM start-up and shutdown. |
![]() |
5 | The Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources. |
![]() |
6 | The Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM and the methods used to create, display and manipulate CMS files. |
![]() |
5 | The Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also described. |
![]() |
5 | The Linux on z Systems Fundamentals course discusses common Linux distributions for the z systems environment, how Linux is accessed, its operational implementation, and the general monitoring and management of Linux. The Administrator module provides an overview of the tuning, monitoring, and analyzing tasks performed by the Linux Administrator and contains tips for best practice in these areas. |
» VSE
Course Title | Duration | Description |
4 | The Introduction to VSE course introduces the concepts and components of VSE. It describes the concept and use of virtual storage and power, different file structures, access methods, library organization, and VSE utilities. | |
4 | The JCL - Basic VSE Job Control course introduces the three basic job statements. It also describes the order of the JCL and its relevance to the job control program. | |
5 | The JCL - Advanced VSE Job Control course explains advanced JCL techniques. It describes coding a job stream, complex DLBL statements, conditional JCL, and the LIBDEF and LIBDROP statements. | |
2 | The JECL Statements course explains how to recognize VSE JECL statements as distinct from JCL. It describes how to code and use these statements and their parameters. | |
3 | The CICS for VSE Operators course explains CICS concepts and facilities from startup procedures to an orderly shutdown. It also describes CICS commands and display messages. | |
2 | The COBOL for VSE course examines the non-standard implementations of COBOL in the VSE environment. Designed for learners with previous experience in using generic COBOL, it describes compiling, file access, and how to access VSE subsystems such as CICS and DB2. | |
3 | The Power I course explains how to use Power commands to manage the VSE system. It describes the commands to display job elements, start, hold, and cancel Power jobs. | |
3 | The Power II course explains how to manipulate the Power Queues for more efficient operating. It describes some of the less used but powerful Power commands. | |
4 | The REXX Programming I for VSE course introduces the REXX programming language and explains how to run it in the VSE environment. It also describes the major elements of the language, its keywords and functions. | |
2 | The REXX Programming II for VSE course explains how to produce a structured REXX program and execute it in the VSE environment. | |
8 | The VM Concepts and Facilities course introduces the concepts of the virtual machine and explains the VM operating system. It also describes the VM/CMS commands and facilities required to operate or program in the VM environment. | |
2 | The VM/ESA Overview course provides an overview of the ESA update of VM. This includes the requirements to IPL and running guest operating systems. | |
3 | The VSE Operations I course explains message structure and how to monitor the System Log. It also lists the basic operating commands. | |
4 | The VSE Operations II course explains the more advanced operating commands, including Supervisor Program commands and VAE. | |
4 | The VSE Utilities course describes the main utilities that are required to display resources of a VSE system. It explains their function and how they are used. | |
8 | The VTAM for VSE Operators course explores VTAM concepts and the IBM network structure. It also explains the VTAM commands to manipulate and manage a VSE VTAM Network. |
» zEnterprise
Course Title | Duration | Description |
![]() |
7 | This course discusses how world trends are affecting many aspects of IBM Z mainframes created today, with several case studies being presented that explain the benefits organisations are gaining from their implementation. An in-depth look inside the z13, and entry-level z13s mainframes, as well as the premier z14 mainframe are provided, highlight many features and components that are required to keep today's businesses securely running 24 x7. An overview of the zBX distributed environment is also provided, explaining how it can be integrated with the mainframe. Details of the LinuxONE system, IBM's current all-Linux mainframe, is covered, explaining its value in today's IT landscape. |
![]() |
5 | This course describes how the zEnterprise system manages workloads across heterogeneous platforms and describes the components that comprise and support this system. The course above has replaced this course and it will retire on April 30, 2018. |
» z/OS
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
z/OS Series |
||
![]() ![]() | 5 | The z/OS Concepts and Components course describes the evolution of mainframe computing and provides descriptions of the major components that comprise today's z/OS environment. Details of general z/OS processing concepts are also provided. |
![]() |
4 | The Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system startup and shutdown, describing the most common commands and operator responses. |
![]() |
5 | The Monitoring the z/OS System course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices. An overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS are also provided as well as a description on how SMF data is created and controlled. This course also discusses the need for message suppression and describes how this is achieved. |
![]() |
4 | The z/OS Architecture course examines the logical architecture of a z/OS system. It looks at the use and structure of the Program Status Word (PSW), the different types of interrupts handled by the system, and how they are invoked. It also describes the concepts and use of virtual storage and how it relates to address spaces within the system. Finally, it identifies the functions used by the System Resource Manager to balance and maximize system performance. |
![]() |
5 | The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space. |
![]() |
5 | The Resolving z/OS System Problems course describes the processes and commands required to resolve common z/OS system problems. It also describes when cancel and force commands should be used and how to handle command flooding. |
z/OS Console Simulators Series |
||
![]() |
3.5 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources. |
![]() |
.5 | Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shutdown and start-up of a z/OS system. |
z/OS Performance Monitoring Series |
||
12 | The Performance Monitoring Basics course describes the processes required to identify situations where total system performance is degraded. It also examines the use of RMF and OMEGAMON to identify and resolve individual problem conditions and identify where performance can be improved. | |
Installing and Managing z/OS Software Series |
||
3 | Ensuring that all of your organization's z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software. |
» z/OS Connect
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
![]() |
1 | The Introduction to z/OS Connect course discusses the need for organization's to open up their mainframe data to cloud, mobile and web customers and describes how z/OS Connect provides this capability. The last section of this course is for IT specialists that need to know how resource access and data communication is performed by z/OS Connect. |
» z/OS Management Facility
Course Title | Duration | Description |
These courses are available for z/OS version 2.2 and 2.1. | ||
6 | This course provides the learner with a basic understanding of the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it. |
» z/OS UNIX System Services
Course Title | Duration | Description |
![]() |
3 | This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used. |
![]() |
4 | This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing. |
![]() |
4 | This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing. |
Non-Mainframe Subject Areas
» Business Strategy and Operations
Operations Curriculum |
Fundamentals of Lean for Business Organizations Managing Customer-Driven Process Improvement Operations Management Purchasing and Vendor Management Essentials Six Sigma Black Belt (2007 BOK) Six Sigma Green Belt Six Sigma Yellow Belt Supply Chain Operations |
Strategic Planning Curriculum |
Business Planning Essentials Developing Strategic Thinking Acumen IT Strategy Essentials Leading and Implementing Sustainable Green Business Strategies Risk Management The Fundamentals of Globalization |
Marketing Curriculum |
Marketing Essentials Strategic Brand Management |
» Finance, Human Resources and Administration
Finance & Accounting Curriculum |
Auditing Essentials Budgeting Essentials Capital Budgeting Essentials Finance and Accounting Essentials for Non-financial Professionals |
Global Banking and Financial Services Curriculum |
Bank Risks and Capital Adequacy Planning Basel III and Liquidity Risk Management Basel Regulations and Bank Risk Management Commodity and Energy Markets, Futures, and Forwards Counterparty Credit Risk and Credit Rating Credit Derivative Instruments Credit Risk Analysis Global Banking Supervision and Anti-Money Laundering Regulations Insurance Concepts, Types, and Annuities Mutual Fund Concepts, Portfolio Management, and Regulations |
Administrative Support Curriculum |
|
Human Resources Curriculum |
Compensation and Benefits (HRCI: PHR/SPHR-aligned) Employee and Labour Relations (HRCI: PHR/SPHR-aligned) Essentials of Interviewing and Hiring Human Resource Development (HRCI: PHR/SPHR-aligned) Human Resources Core Knowledge (HRCI: PHR/SPHR-aligned) Organizational Behaviour Recruiting and Retention Strategies Risk Management (HRCI: PHR/SPHR-aligned) Strategic Human Resource Management (HRCI: SPHR-aligned) The role of HR as a Business Partner Workforce Planning and Employment (HRCI: PHR/SPHR-aligned) |
» Management and Leadership
Management Curriculum |
Business Coaching Essentials Business Execution Delegation Essentials Difficult Conversations Dismissing an Employee Effectively Managing Top Performers Essential Mentoring Techniques Essentials of Facilitating Essentials of Managing Technical Professionals First Time Manager Essentials Management Essentials Managing during Difficult Times Managing Experts Managing Organizational Change Managing Problem Performance Performance Appraisal Essentials Performance Management Strategies for Successful Employee On-boarding Talent Management Essentials The Fundamentals of Business Crises Management Thinking Like a CFO Workforce Generations |
Leadership Curriculum |
Developing a Culture of Learning Effective Succession Planning Employee Engagement Leadership Essentials Making Cross-Functional Teams Work Setting and Managing Organizational Priorities The Voice of Leadership |
Management & Leadership |
Crisis Management Knowledge Management Leading By Example Management Development Program Team Building Women in Leadership Working with Consultants |
» Professional Effectiveness
Communication Curriculum |
Basic Presentation Skills Business Grammar Basics Business Writing Basics Communicate with Diplomacy and Tact Communicating Effectively with the 'C' Level Constructive Feedback and Criticism E-mail Essentials for Business Emotional Intelligence Essentials Fundamentals of Cross Cultural Communication Fundamentals of Working with Difficult People Getting Results without Direct Authority How to Write an Effective Internal Business Case Interpersonal Communication Listening Essentials Negotiation Essentials Professional Networking Essentials Running Effective Business Meetings Telephone Essentials for Business Workplace Conflict Writing Skills for Technical Professionals |
Foundation Skills Curriculum |
|
Personal Development Curriculum |
Business Ethics Business Etiquette and Professionalism Campus to Corporate Collaboration and Decision Making Critical Thinking Essentials Cross Cultural Communication Dealing with Organizational Change Decisiveness Diversity on the Job Doing Business Professionally Effective Time Management Generating Creative & Innovative Ideas Interviewing Strategies for the Interviewee Living and Working Abroad in the United States Managing Your Career Optimizing Your Work/Life Balance Peer Relationships Performance under Pressure Perseverance and Resilience Personal Productivity Improvement Problem Solving and Decision-Making Strategies Public Speaking Strategies Telecommuting and the Remote Employee Wellness Writing Under Pressure |
» Sales and Customer Facing Skills
Sales Curriculum |
Sales Foundations Sales Management Sales Negotiations Solution Selling Strategic Account Sales Skills |
Customer Service Curriculum |
Customer Focus Customer Service Customer Service Fundamentals Customer Service Representative, Process Customer Service Representative, Professionalism Customer Service Representative, Skills Frontline Call Centre Skills Inbound Call Centre Management |
Industry Foundations |
|
» Desktop Computer Skills
Adobe, Graphic Design and Page Layout |
Adobe AIR 3 Adobe Captivate 7 Adobe CC Overview New Features Adobe ColdFusion 10 Adobe Dreamweaver CC Adobe Flash Professional CC Adobe Illustrator CC Adobe InDesign CC Adobe Photoshop CC Adobe Premiere Elements 12 Adobe Reader X Also available: Adobe CS5, CS4 and earlier. |
Best Practices for Desktop Users |
Social Networking for Users |
Microsoft Office 2013 |
Microsoft Office 2013: Beginning Outlook Microsoft Office 2013: Beginning PowerPoint Microsoft Office 2013: Beginning Word Microsoft Office 2013: Advanced Excel Microsoft Office 2013: Advanced Outlook Microsoft Office 2013: Advanced PowerPoint Microsoft Office 2013: Advanced Word Microsoft Office 2013: Power User Excel Microsoft Office 2013: SharePoint for End Users Microsoft Office 2013: SharePoint for Power Users Also available: Microsoft Office XP, 2003, 2002 and earlier. |
Microsoft Office for Mac 2011 |
Microsoft Office: Beginning Excel for Mac 2011 Microsoft Office: Beginning Outlook for Mac 2011 Microsoft Office: Beginning PowerPoint for Mac 2011 |
Microsoft Windows 8 |
Microsoft Windows 8: End User Also available: Microsoft Windows 7, Vista, XP and earlier. |
Home User: Home and Personal Finance |
Fundamentals of Crystal Reports 2011 |
Apple iOS |
Fundamentals of Crystal Reports 2011 Getting Started with iOS 8 for iPad Getting Started with iOS 8 for iPhone Getting Started with Mac OS X Yosemite |
Lotus Notes 8 |
Lotus Notes 8: End User Also available: Lotus Notes 7 and earlier. |
Microsoft Internet Explorer 9 |
Also available: Internet Explorer 8, 7, 6 and earlier. |
Seagate Crystal Reports |
Crystal Reports XI: Report Writing Basics |
SAP |
SAP Business Suite 7 for End Users SAP Business One for End Users SAP Business Objects Business Intelligence |
» Software Development
Algorithms, Defensive Programming, Generic Languages and Other Techniques |
C++11 Programming Essentials Programming in C++ Git Fundamentals Defensive Programming in C# Fundamentals of Eclipse Developing With Python Introduction to R Programming Introduction to Swift Programming Programming with ANSI C Ruby On Rails Ruby Programming Software Development Fundamentals with Visual Studio Working with Clojure |
Java 2 Programming |
Introduction to Java EE 6 Java Hibernate Java SE 7 New Features Java SE 8 Fundamentals Java SE 8 Programming Java SE7 Fundamentals Java SE7 Professional Also available: Java SE6 and earlier. |
Microsoft .NET Software Development Tools |
Architecture N-Tier/REST Essentials of Developing Windows Store Apps Using C# Microsoft .NET Framework 4: Accessing Data with Visual Basic 2010 Microsoft .NET Framework 4: Web Application Development with Visual C# 2010 Microsoft .NET Framework 4: Windows Application Development with Visual Basic 2010 Microsoft .NET Framework 4: Windows Application Development with Visual C# 2010 Microsoft .NET Framework 4: Windows Communication Foundation with Visual Basic 2010 Microsoft .NET Framework: WPF with XAML and C# Microsoft .NET: An Overview Web Applications Development with Microsoft .NET Framework 4 using Visual Basic 2010 Windows Communication Foundation Development in C# with Microsoft .NET Framework (70-513) Also available: Microsoft .NET Framework 3.5 and 2.0. |
Microsoft Web Applications, Windows Store and Mobile App Development |
Microsoft Azure and Web Services Microsoft Visual Studio 2012: Programming in HTML5 with JavaScript and CSS3 Microsoft Visual Studio 2013: Windows Store App Essentials - HTML5 and JavaScript Web API Essentials Advanced Windows Store App Development Using C# and XAML ASP.NET MVC Web Application Development Microsoft Advanced Windows Store App Development using HTML5 and JavaScript Programming Cross-Platform Applications in Visual Studio with Xamarin |
Other Microsoft Technologies |
Microsoft Enterprise Library Microsoft LINQ Microsoft ORM: Microsoft Entity Framework Microsoft ORM: NHibernate |
Software Programming Fundamentals |
|
Software Development Principles |
Agile Software Development Best Practices for Software Programming Software Practices (SCRUM) Software Practices: Waterfall User Experience (UX) Design Foundations |
Software Testing Foundations |
Microsoft Visual Studio Team Foundation Server 2013 Administration Selenium Automated Web Testing Software Testing Foundations Software Testing Fundamentals Software Testing with Visual Studio Testing with JUnit |
Web Development Technologies |
CQRS Theory Introduction to Ajax Development |
» Operating Systems and Server Technologies
CompTIA |
CompTIA A+ 220-802 CompTIA Linux+ 2014 Powered By LPI: LX0-103 CompTIA Linux+ 2014 Powered By LPI: LX0-104 CompTIA Server+ 2009 CompTIA Server+ 2014 |
Linux Professional Institute |
Linux Professional Institute: Advanced Level Linux Professional (LPIC-2) Exam 202 Linux Professional Institute: Junior Level Linux Professional (LPIC-1) Exam 101 Linux Professional Institute: Junior Level Linux Professional (LPIC-1) Exam 102 |
Microsoft Exchange Server, Windows Server, IIS and Lync |
Microsoft Exchange Server 2013: Core Solutions Microsoft Exchange Server 2013: Advanced Solutions Microsoft Windows Server 2008 R2: Server Virtualization with Hyper-V Microsoft Internet Information Services Microsoft Lync Server 2013 |
Microsoft SharePoint Server 2013 |
Microsoft Sharepoint Server 2013: Core Solutions Microsoft SharePoint Server 2013: Designing Advanced Solutions Also available: SharePoint Server 2007 and earlier. |
Microsoft SharePoint Server 2010 |
Microsoft SharePoint 2010 SP1: Administration Microsoft SharePoint 2010: Administration Microsoft SharePoint 2010: Application Development Microsoft SharePoint 2010: Configuring Microsoft SharePoint Server 2010 SP1: Configuring Also available: SharePoint Server 2007 and earlier. |
Microsoft System Center Essentials |
|
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2: Configuring Advanced Services Microsoft Windows Server 2012 R2: Designing and Implementing an Infrastructure Microsoft Windows Server 2012 R2: Implementing an Advanced Infrastructure Microsoft Windows Server 2012 R2: Installing and Configuring Also available: Microsoft Windows Server 2008, 2003 and earlier. |
Office 365 |
Managing Identities and Requirements in Office 365 |
VMware |
VMware vSphere 6 Install, Configure, Manage: Part 2 Vmware Workstation VMware Workstation 11 Fundamentals VMware: Datacenter Virtualization Design and Optimization with vSphere 5 VMware: Datacenter Virtualization with vSphere 5 - Part 1 VMware: Datacenter Virtualization with vSphere 5 - Part 2 |
Windows PowerShell |
Microsoft PowerShell and SharePoint Microsoft PowerShell and SQL Server Microsoft PowerShell for Windows |
» Internet and Network Technologies
Social Networking |
|
CompTIA Networking, Internetworking and Security Technologies |
CompTIA Network+ 2012 CompTIA Network+ N10-006 CompTIA Security+ 2011 CompTIA Security+ SY0-401 |
Network Protocols |
Networking Fundamentals |
Security Solutions |
Certified Information Security Manager (CISM) Certified Internet Security Auditor (CISA) Certified Secure Software Lifecycle Professional (CSSLP) CompTIA Advanced Security Practitioner CAS-002 Microsoft Security Fundamentals What's New in CISSP 2015 |
Cisco |
Certified Information Systems Security Professional (CISSP) CICD 1.0: Implementing Cisco Collaboration Devices CIPT1 8.0: Implementing Cisco Unified Communications Manager Part 1 CIPT2 8.0: Implementing Cisco Unified Communications Manager Part 2 Cisco SENSS 1.0 Cisco SITCS 1.0: Implementing Cisco Threat Control Solutions DCICN 1.0: Introducing Cisco Data Center Networking DCICT 1.0: Introducing Cisco Data Center Technologies DESGN 2.1: Designing for Cisco Internetwork Solutions ICND1 2.0: Interconnecting Cisco Networking Devices Part 1 ICND2 2.0: Interconnecting Cisco Networking Devices Part 2 ICOMM 8.0: Introducing Cisco Voice and Unified Communications Administration IINS 2.0: Implementing Cisco IOS Network Security Implementing Cisco Secure Access Solutions (SISAS) 1.0 Implementing Cisco Voice Communications and QoS (CVOICE) ROUTE 1.0: Implementing Cisco IP Routing ROUTE 2.0: Implementing Cisco IP Routing SIMOS 1.0: Implementing Cisco Secure Mobility Solutions SWITCH 1.0: Implementing Cisco IP Switched Networks SWITCH 2.0: Implementing Cisco IP Switched Networks TSHOOT 1.0: Troubleshooting and Maintaining Cisco IP Networks TSHOOT 2.0: Troubleshooting and Maintaining Cisco IP Networks TVOICE 8.0: Troubleshooting Cisco Unified Communications |
EMC |
|
Cloud Computing |
Cloud Computing for IT professionals CompTIA Cloud+ Managing Citrix XenDesktop 7 Solutions Microsoft System Center 2012 R2: Configuring and Deploying a Private Cloud Microsoft System Center 2012 R2: Monitoring and Operating a Private Cloud OpenStack Fundamentals |
» Enterprise Database Systems
Big Data |
Apache Spark Fundamentals Big Data Fundamentals |
Business Intelligence |
|
Data Science |
|
Oracle 12c |
Oracle Database 12c: Backup and Recovery Oracle Database 12c: Install and Upgrade Oracle Database 12c: New Features for Administrators |
Oracle 11g |
Oracle Database 11g: Administration Workshop I Release 2 Oracle Database 11g: Administration Workshop II Oracle Database 11g: Administration Workshop II Release 2 Oracle Database 11g: Develop PL/SQL Program Units Oracle Database 11g: Introduction to SQL Oracle Database 11g: New Features For Administrators Oracle Database 11g: New Features for Administrators Release 2 Oracle Database 11g: PL/SQL Fundamentals Oracle Database 11g: Program with PL/SQL Oracle Database 11g: RAC Administration Oracle Database 11g: Secure Backup Oracle Database 11g: Security Oracle Database 11g: SQL and PL/SQL New Features Oracle Database 11g: SQL Fundamentals I Oracle Database 11g: SQL Fundamentals II Oracle Database 11g: SQL Tuning Oracle SOA Suite 11g Also available: Oracle 10g. |
Systems and Database Design |
Database Design Fundamentals |
Microsoft SQL Server 2012 |
Microsoft SQL Server 2012: Implementing a Data Warehouse Microsoft SQL Server 2012: Querying Microsoft SQL Server: Developing Databases |
Microsoft SQL Server 2014 |
Microsoft SQL Server 2014: Designing Database Solutions Microsoft SQL Server 2014: Implementing Data Models and Reports |
MySQL and No SQL |
MongoDB NoSQL RavenDB Fundamentals |
» Enterprise Resource Planning Systems
Microsoft Dynamics |
Microsoft Dynamics CRM 2013: Applications Microsoft Dynamics CRM 2013: Customization and Configuration |
Oracle 11i |
Oracle 11i E-Business Suite: System Administrator Fundamentals Oracle 11i: Project Foundation Fundamentals Oracle 11i: Navigate Oracle Applications |
SAP |
Overview of SAP R/3 Release 4.6 SAP ABAP Programming Fundamentals |
» Web Design
Web Development |
HTML5 XML Essentials Apache Web Services Designing and Hosting a Web Site Responsive Web Design WordPress |
Scripting and Web Languages |
Application Development with Node.js and the .NET Framework Building Apps with jQuery Mobile Building Web Applications with Node.js CSS3, Sass and Less Developing with Kendo UI Introduction to Bootstrap JavaScript - Ember.js JavaScript - JsRender JavaScript - Knockout JavaScript Essentials JavaScript Sencha JavaScript Single Page Apps Javascript: Backbone.js jQuery TypeScript Essentials Underscore.js |
» Project Effectiveness
Project Management Curriculum |
Code of Ethics and Professional Conduct (PMI® Standard-aligned) IT Project Management Essentials Managing Software Project Outsourcing Mentoring Assets PRINCE2®: 2009 Foundation PRINCE2®: Practitioner Project Management for Non-Project Managers Certified Associate in Project Management (CAPM) - PMBOK® Guide - Fifth Edition-aligned Project Management Professional (PMP) - PMBOK® Guide - Fifth Edition-aligned |
Team Building Curriculum |
Optimizing Your Performance On a Team |
Business Analysis |
|
» Project Management for Mainframe Professionals
IT Business |
Customer Service Representative, Professionalism Customer Service Representative, Skills Information Security for End Users IT Infrastructure Library (ITIL®) 2011 Edition Foundation Syllabus IT Strategy Essentials |
ITIL Series |
ITIL® 2011 Edition Intermediate Level: Operational Support and Analysis (OSA) ITIL® 2011 Edition Overview |
Help Center
Instant Web Chat:
- Chat with tech support or
- have a product question?
+44 (0) 1625 441120