Broadcom - Interskill Learning Mainframe Training

[email protected]

The Online Mainframe Training Specialists
Search   Course Catalog  

Mainframe eLearning Library Catalog

Below is a complete list of all self-paced elearning courses grouped by curriculum. We recommend you follow a job-role specific Learning Plan but courses can be taken at any time, in any order and unlimited times within your contract period. Courses and assessments are accessed by students online 24/7 via our Learning Management System(LMS). Please contact your Broadcom Representative with any questions.


  »  Assembler
Course Title Duration
(Hours)
Description
Assembler Introduction
5 The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability.
Assembler Instructions
7 The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed.
Assembler Macros
5 The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use.
Assembler Programming
8 The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings.
Assembler z/OS Advanced
5 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
Assembler Cross Memory Services
4 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
  »  Blockchain
Course Title Duration Description
Blockchain Technologies
4 The Blockchain Technologies course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network.
  »  C Programming
Course Title Duration
(Hours)
Description
C/C++ on z/OS for C Programmers 1 This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment.
  »  CA Curriculum
Course Title Duration
(Hours)
Description
CA 1 Series
CA 1® Tape Management - Using Tape Media 5 The CA 1® Tape Management - Using Tape Media course describes the use of the CA 1® Tape Management system, the online facility and its uses, and the standard daily maintenance processing required by CA 1.
CA 1® Tape Management - Identifying and Resolving Media Problems 5 The CA 1® Tape Management - Identifying and Resolving Media Problems course describes the structure of the CA 1 Tape Management system, its chaining process, AIVS and tape stacking facilities, problem determination, and the utilities available for correcting structural problems and reporting.
CA OPS/MVS Series
CA OPS/MVS – Event Management and Automation - Overview, Components and Features 5 The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided.
CA OPS/MVS – Event Management and Automation - Rules and OPS/REXX 5 The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided.
CA OPS/MVS – Event Management and Automation - Automating Events Using the Relational Data Framework 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation.
CA OPS/MVS – Event Management and Automation - Automating Events Using the System State Manager (SSM) 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed.
CA OPS/MVS –Event Management and Automation - Schedule and Group Managers for Event Management 4 The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed.
CA 7 Workload Automation Series
Introduction to CA Workload Automation - CA 7® Edition 4 This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions.
CA 7 Workload Automation - Scheduling Batch Processing 6 This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7.
CA 7 Workload Automation - Monitoring and Maintaining the Batch Processing Environment 6 This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes.
CA 7 Workload Automation - System Programmer Interaction with CA 7 4 This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting.
CA 7 Workload Automation - Backup, Recovery and Problem Resolution 5 This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided.
CA 11 Workload Automation Series
CA Workload Automation Restart Option for z/OS Schedulers Overview 4 The Workload Automation Restart Option for z/OS Schedulers Overview course introduces the components, functions, and capabilities of CA 11, and describes how job information is stored and processed by this product.
Managing CA Workload Automation Restart Option for z/OS Schedulers 4 This course looks at the interaction that users have with CA 11 in order to determine the status and attributes of job information stored in the CA 11 database. It also identifies how CA 11 data can be used for generating reports. Common online commands and batch generation programs are discussed in detail, while the last module focuses on possible CA 11 problems and resolution and includes an overview of backup and recovery strategies associated with CA 11.
CA Endevor Change Manager Series
CA Endevor™ Software Change Manager Introduction and Basic Usage 6 The CA Endevor™ Software Change Manager Introduction and Basic Usage course provides an overview of change management practices and describes the role that CA Endevor SCM plays. A general description of CA Endevor SCM configuration defaults is provided along with details of foreground and batch processing tasks that can be performed.
CA Endevor™ Software Change Manager Package Processing and Facilities 5 The CA Endevor™ Software Change Manager Package Processing and Facilities course describes the purpose of packaging and how it is performed in foreground and batch modes. A comparison of functions available using CA Endevor SCM Quick Edit and the CA Endevor SCM ISPF Interface is discussed. The Query facility is also described, along with how to use the Automated Configuration Management data.
  »  CA Premium Curriculum
CA ACF2™
Course Title Duration
(Hours)
Course ID Description
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - PDS Member Level Protection .75 06ACF30340 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - Basic GSO Options 1.25 06ACF30230 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations. This course contains the same information as the Instructor-Led Training (06ACF30221).
CA ACF2 for z/OS Version 16.x: Intermediate Administration 300 - Apply Privilege Control 4 06ACF30240 The topic of this WBT is Apply Privilege Control which will show students how to extend and apply limits to CA ACF2 privileges in a dynamic and granular fashion, provide a stronger implementation to meet corporate security goals, and defining special privileges and controls.
CA ACF2 for z/OS Version 16.x: Leverage Profile Records .75 06ACF30250 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations.
CA ACF2 for z/OS Version 16.x: Apply Cross Reference Records 1 06ACF30260 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - Digital Certificates 1.75 06ACF30270 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Intermediate Administration 300 - Apply Digital Certificates 1 06ACF30280 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Secure FTP 1.25 06ACF30290 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations.
CA ACF2 r1.3 Option for DB2 200 4 06ACF20080 This course will introduce you to the features of CA ACF2 Security Option for DB2, which provides default protection for users who connect to DB2 and use DB2 objects and resources. The class will identify and discuss DB2 and native DB2 security, along with how CA ACF2 Security Option for DB2 replaces and enhances DB2 security. Case studies and class workshops will prepare you to write and implement rules for numerous DB2 data objects and resources for new or existing DB2 subsystems. Furthermore, the class will provide valuable information so that you can identify and use specific CA ACF2 Security Option for DB2 security options, special utilities and reports. You will return to your job ready to customize your installation of CA ACF2 Security Option for DB2.
CA ACF2 for z/OS Version 16.x: Foundations 200 - Describe Mainframe .25 06ACF20100 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
CA ACF2 for z/OS Version 16.x: Foundations 200 – Describe CA ACF2 Features and Capabilities .5 06ACF20110 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Logonid Concepts .75 06ACF20120 This course is broken into multiple parts. Each part can be taken individually, or as part of the complete course. If all modules are taken, it is recommended that they be taken in the order listed on page 2 of this course description. This course contains the same information as the Instructor-Led Training (06ACF20091)
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Work with Logonids 1.5 06ACF20130 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Secure Data 1.25 06ACF20140 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Resource Rules 1.5 06ACF20150 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Secure Resources 1 06ACF20160 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.

CA Brightside
Course Title Duration
(Hours)
Course ID Description
CA Brightside Support Offering 100 .75 06BRS10010 This course will introduce you to CA Brightside and it’s main components.
CA Brightside Installation Overview 100 .5 06BRS10020 This course will introduce you to CA Brightside and it’s main components.
CA Brightside: Getting Started with the Zowe API Mediation Layer 200 .75 06BRS20080 This course will focus on the Zowe API Mediation Layer component of the CA Brightside support offering.

CA Cleanup
Course Title Duration
(Hours)
Course ID Description
CA Cleanup: Introduction .25 06CLN10010 This course provides a brief introduction of CA Cleanup as one of several Web Based Training courses that contain the same information as the CA Cleanup Instructor Led Training.
CA Cleanup for z/OS: Product Components .25 06CLN20010 This course provides details of CA Cleanup’s basic components and how CA Cleanup works. This course is one of several Web Based Training courses that contain the same information as the CA Cleanup Instructor Led Training.
CA Cleanup for z/OS: Best Practices 200 .25 06CLN20020 This Course Will Show You How To: Describe best practices related to CA Cleanup, Describe additional functionality when running reports.
CA Cleanup for z/OS: Using CA Cleanup for ACF2 200 .5 06CLN20030 This course shows how to use CA Cleanup for ACF2. This course is one of several Web-Based Training courses that contain the same information as the CA Cleanup Instructor-Led Training.

CA 1 Tape Management
Course Title Duration
(Hours)
Course ID Description
CA 1 Tape Management: Tape Processing .5 06TPM20110 In this course, you will learn about tape data sets and tape labels and how these tape characteristics relate to CA 1 tape management.
CA 1 Tape Management: Tape Processing with CA 1 .75 06TPM20120 In this course, you will learn how and when CA 1 gains control and when the TMC is updated. It will also explain the use of EXPDT and REPDT in your JCL to obtain the desired expiration date for a tape.
CA 1 Tape Management: Initialization and Operation .5 06TPM20130 In this course, you will learn how to start CA 1, the messages that are produced, and some of the system abends that may occur.

CA Gen
Course Title Duration
(Hours)
Course ID Description
CA Gen Encyclopedia - Concepts and Functions 1.5 06GEN20340 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Manage Models .5 06GEN20350 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Transfer Data 1.5 06GEN20360 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Control Access .5 06GEN20370 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen: Design and Construction for GUI and Web - Design the Database .5 06GEN20380 This Course Will Show You How To: Design a database in CA Gen. This will enable you to transform data models that you have developed for your own business applications.
CA Gen: Design and Construction for GUI and Web - Generate and Install the Database .5 06GEN20390 This Course Will Show You How To: Generate and install a database.


CA InterTest
OnDemand CA InterTest Batch V10: Testing and Debugging 200 2.5 06ITB20150 This course is designed for programmers who test, debug, and fine-tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to detect and resolve errors interactively as they occur to help effectively minimize your application downtime and improve overall application quality.
CA InterTest for CICS: Interactive Debugging and Breakpoints 200 .5 06ITT20010 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will enable you to use CA InterTest for CICS to help debug programs and work with breakpoints.
CA InterTest for CICS: Test Prerequisites (Setup) 200 .5 06ITT20020 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will show you basic navigation and the core testing functionalities included in CA InterTest for CICS, including use of symbolics, monitoring, breakpoints, and Keep window options.
CA InterTest for CICS: Breakpoint activities (Debugging) 200 .75 06ITT20030 This Course Will Show You How To: Resume execution from a breakpoint, Apply single-stepping, auto-stepping, and step timing, Abend a task, Apply the Backtrace feature, Apply the Code Coverage feature, Apply indirect commands, Display breakpoints for a program, New Copy a recompiled program and reset breakpoints, Modify program data item values, Access interactive help
CA InterTest for CICS: Advanced Debugging Features 200 .75 06ITT20040 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will show you how to apply various commands and features used to debug programs.
CA InterTest for CICS: Other Facilities 200 .25 06ITT20050 This Course Will Show You How To: Test DB2 and SQL/DS programs, Maintain help entries for user abend codes, Access CA SymDump for CICS, Describe CA InterTest Batch
CA Librarian
CA Librarian: Overview 100 .25 06LIB10010 This course provides an overview of CA Librarian.

CA Database Management for DB2® for z/OS®
Course Title Duration
(Hours)
Course ID Description
CA Plan Analyzer for DB2 r16: Core Functions 200 1.5 06DBT20420 CA Plan Analyzer is a database performance management product that provides efficient and easy-to-understand DB2 plan analysis. It can be used to analyze a single SQL statement or an entire application. This course is designed to show you how to analyze SQL from multiple sources. You will learn how to set up EXPLAIN processes, compare historical versions of access paths, and generate detailed access path analysis reports.
CA RC/Migrator and RC/Compare for DB2 V16: Core Functions 200 4 06DBT20430 CA RC/Migrator and CA RC/Compare are database administration products that automate error-prone and labor-intensive administration tasks. CA RC/Migrator automates tasks such as migrating DB2 objects, altering object definitions, and replication, migration and alteration task to multiple subsystems. CA RC/Compare automates the process to keep your environment's DB2 schemas consistent. This course will show you how to set up RC/Migrator and RC/Compare. In addition, you will see how to create, analyze and execute a migration and a compare strategy using RC/Migrator and RC/Compare.
CA Fast Load and CA Fast Unload r16 for DB2: Core Functions 200 1.5 06DBT20490 CA Fast Load and CA Fast Unload are high-speed utilities designed to load and unload large amounts of data with little or no impact on system performance. CA Fast Load and CA Fast Unload provide extensive formatting and data conversion options to make the data available for immediate use by other applications. This course will enable you to load and unload data within DB2 using CA Fast Load and CA Fast Unload. In addition, you will learn to leverage other CA tools and functions while loading and unloading data.
Requirements for Using Mainframe Team Center - Database Management for Db2 for z/OS: Foundations 200 .25 06DBT20530 This course will familiarize you with the architecture and the requirements for using Mainframe Team Center - Database Management for Db2 for z/OS.
OnDemand CA Fast Recover and CA Recovery Analyzer V18 for DB2: Core Functions 200 1.5 06DBT20590 This course provides an introduction to the core functions of CA Fast Recover and CA Recovery Analyzer. You will discover how to configure the products, perform key tasks such as recovering data at various levels, and creating/analyzing recovery strategies. The learning experience is enhanced by hands-on self-paced lab exercises that will give you an opportunity to perform the tasks yourself.
OnDemand CA Quick Copy and CA Merge/Modify V18 for DB2 for z/OS: Core Functions 200 2 06DBT20600 This course is designed to help you understand and utilize the core functions of CA Quick Copy and CA Merge/Modify. You will learn how to reduce the time and effort spent on routine tasks, how to accelerate the recovery process, how to create up-to-date copies, without adversely impacting online availability of the tables, and how to implement the recovery procedures that work best for your business.
OnDemand CA RC/Migrator and RC/Compare V18 for DB2 for z/OS: Core Functions 200 1.5 06DBT20610 This course is designed to help you understand and utilize the core functions of CA Merge/Modify and CA Quick Copy.
On Demand CA Report Facility for TSO: Creating Queries 200 .25 06DBT20770 This course will show learners how to create queries, both temporary and permanent, from your DB2 database. Learners will see how to work with single and multiple table queries, filter data to be retrieved, and define expressions.
On Demand CA Report Facility for TSO: Creating Forms 200 .25 06DBT20780 This course will show learners how to take their existing queries and display them in three format/views. Learners will then be able to format they raw query data in the optimum format for the intended audience.
On Demand CA Report Facility for TSO: Creating Procedures 200 .25 06DBT20790 This course will show learners how to take their existing queries and forms and automate the reporting function. Learners will then be able to execute a procedure that will run saved queries and the corresponding saved forms, either on demand or via a batch run.

CA Datacom
Course Title Duration
(Hours)
Course ID Description
CA Datacom/DB: Database Key Concepts 1.5 06DCM20130 This course addresses key database concepts of CA Datacom.
CA Datacom®/DB: Defining the Multi-User Facility 200 1 06DCM20190 This course introduces you to key CA Datacom/DB Multi-User (MUF) concepts, features, and facilities.
CA Datacom/DB: Managing the Multi User Facility 200 1 06DCM20200 This course covers how to configure, monitor, and manage key resources in order to keep CA Datacom/DB Multi-User Facility (MUF) running as effectively and efficiently as possible.
CA Datacom/DB: Defining DBUTLTY 200 1.5 06DCM20010 This Course Will Show You How To: Describe what DBUTLTY is Describe DBUTLTY command format and functions Describe DBUTLTY command error options Describe the impacts of the SIMPLIFY feature and external security Describe DBUTLTY execution results and output content Describe DBUTLTY/MUF interaction and resource ownership

CA Deliver
Course Title Duration
(Hours)
Course ID Description
CA Deliver™ Using Distribution Tables to Enhance Dynamic Report Distribution 200 .5 06DLV20010 This Course Will Show You How To: •Explain how to use distribution tables to determine where a report is distributed. •Explain how to use distribution tables to determine which report pages to distribute.
Transitioning Report Distribution From CA Bundl ® to CA Deliver™ 200 .25 06DLV20020 This Course Will Show You How To: • Explain how CA Bundl functionality such as the Standard Translation File(STF) table and the Standard Rule File (SRF) table correspond to distribution tables in CA Deliver. • Describe how the variables and operators used in CA Bundl correspond to the use of variables and operators in CA Deliver.

DevOps
Course Title Duration
(Hours)
Course ID Description
Getting Started with DevOps: Introduction to DevOps .75 06DEV10010 This course will introduce you to the concepts and implementation of DevOps in a Mainframe environment.
Getting Started with DevOps: Source Code Analysis 200 .75 06DEV20010 This Course Will Show You How To: Define Source Code Analysis Set Up & Configure Source Code Analysis Execute Source Code Analysis

SymDump
Course Title Duration
(Hours)
Course ID Description
On Demand CA SymDump for CICS V10: Resolving Abends 200 2 06SYM20180 This course is designed for programmers who test, debug, and fine-tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) and DB2 stored procedures. It will help you get the information for a swift, informed response that can increase application reliability and help you consistently meet your SLAs

CA Easytrieve® Report Generator
Course Title Duration
(Hours)
Course ID Description
CA Easytrieve Report Generator r11.6: Basic Reporting 200 1 06ETR20120 This course is also available as part of a bundle (CA Easytrieve Report Generator r11.6: Reports 200 Bundle - 06ETR2011B). The bundle consists of all three CA Easytrieve Report Generator r11.6 courses including, Getting Started, Program Flow and Logic, & Basic Reporting.
CA Easytrieve Report Generator r11.6: Getting Started 200 .5 06ETR20130 This course includes an introduction to CA-Easytrieve Report Generator to people who have little or no data processing or information retrieval experience, but who need to quickly learn CA-Easytrieve Report Generator to retrieve information and generate standard reports.
CA Easytrieve Report Generator r11.6: Program Flow and Logic 200 .5 06ETR20140 The CA-Easytrieve Report Generator: Program Flow and Logic course provides an overview of the program’s activities and logical condition statements.

Endevor
Course Title Duration
(Hours)
Course ID Description
CA Endevor Software Change Manager: Agile and Concurrent Development Configuration .75 06END20150 In this course, you will examine how CA Endevor SCM manages the software change process by effectively planning and configuring your implementation. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and configure CA Endevor SCM as a software change management tool to align with the Agile methodology and/or the recommended concurrent development method.
On Demand CA Endevor Software Change Manager: Manage Packages and Approval Processing .75 06END20200 In this course, you will examine how CA Endevor SCM manages the software change process by managing the package and approval process. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
OnDemand CA Endevor Software Change Manager: Manage Processors 1.5 06END20180 In this course, you will examine how CA Endevor SCM manages the software change process by creating and testing Generate, Move and Delete processors. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
CA Endevor Software Change Manager: Overview 100 .5 06END10160 This course will show you how to plan the software lifecycle with CA Endevor SCM, how to use element actions to develop, manage, and control software changes.
CA Endevor Software Change Manager: Introduction 100 1 06END10170 This course will introduce you to planning the software lifecycle with CA Endevor SCM, how to use element actions to develop, manage, and control software changes.
CA Endevor Software Change Manager: Using the Eclipse Plug-In User Interface .75 06END20310 In this course, you will examine how CA Endevor SCM may be accessed via the Eclipse-based GUI interface. By attending this course, you can gain the knowledge and skills needed to utilize the Eclipse-based User Interface (UI) to complete many of your daily CA Endevor SCM tasks.
On Demand CA Endevor Software Change Manager: Create the Inventory Structure .75 06END20160 In this course, you will examine how CA Endevor SCM manages the software change process by defining the inventory structure to be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
CA Endevor Software Change Manager: Create Processor Groups 1.5 06END20170 In this course, you will examine how CA Endevor SCM manages the software change process by creating the processor groups to be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement processor groups for use within CA Endevor.
CA Endevor Software Change Manager: Modify a Processor .25 06END20190 In this course, you will examine how CA Endevor SCM manages the software change process by modifying a processor. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
OnDemand CA Endevor Software Change Manager: Perform Package Processing 1.5 06END20210 In this course, you will examine how CA Endevor SCM manages the software change process by creating and casting packages. Additionally, you will learn how to review, execute, and commit packages. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement CA Endevor SCM as a software change management tool.
OnDemand CA Endevor Software Change Manager: Perform Post-Package Processing Actions 200 .5 06END20220 In this course, you will examine how CA Endevor SCM manages the software change process by exploring utilities used for Package processing and deploying Package outputs. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement CA Endevor SCM as a software change management tool.
CA Endevor Software Change Manager: Describe Additional Administration Functions .75 06END20230 In this course, you will examine how CA Endevor SCM manages the software change process through various administration functions that may be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement and maintain CA Endevor SCM as a software change management tool. This Web-based course presents a portion of the same material as the 06END20261 Instructor-led course and is one Web-based course in the CA Endevor® Software Change Manager: Administrators bundle
CA Endevor Software Change Manager: Describe the Eclipse-Based User Interface .5 06END20240 In this course, you will examine how CA Endevor SCM may be accessed via the Eclipse-based GUI interface. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement and utilize CA Endevor SCM. This Web-based course presents a portion of the same material as the 06END20261 Instructor-led course and is one Web-based course in the CA Endevor® Software Change Manager: Administrators bundle.
OnDemand CA Endevor Software Change Manager: Performing Common SCM Tasks 1.25 06END20280 As an application developer using CA Endevor SCM, the concepts and demonstrations in this course can help you develop the knowledge and skills to effectively perform element actions to develop, manage, and control software changes, which can help to accelerate code movement through the application development lifecycle. This training will also help you develop the knowledge and skills to effectively use CA Endevor SCM to perform development common tasks in the Classic ISPF User Interface, CA Endevor Quick Edit, and the CA Endevor Eclipse Plug-in.
CA Endevor: Web Services 300 1.5 06END30020 This Course Will Show You How To: Identify the Web Services components Describe the Web Services implementation Install & initiate the Tomcat Install & enable the Web Services Invoke API requests through the Web Services to validate functionality Identify the use of webhooks Update the Web Services
CA Endevor SCM Enterprise Git Bridge Introduction for the Application Developer 1 06GIT10010 This course will show you how to work with the CA Endevor SCM Integrations for Enterprise DevOps CA Enterprise Git Bridge feature that is designed to integrate with CA Technologies flagship SCM . The focus on this course is the developer.
CA Endevor SCM Integrations for Enterprise DevOps: CA Enterprise Git Bridge Feat .5 06GIT10020 This course will show you how to configure, initialize and use the CA Endevor SCM Integrations for Enterprise DevOps CA Enterprise Git Bridge feature that is designed to integrate GitHub with CA Technologies flagship SCM . The focus on this course is the Repository Owner.

File Master
Course Title Duration
(Hours)
Course ID Description
On Demand CA File Master Plus for DB2 for z/OS Release 9.1: User Basics 200 2 06FMS20070 CA File Master Plus for DB2 for z/OS enables you to work interactively with ISPF panels and a graphical Eclipse-based interface, or issue commands in batch. You can easily view and edit tables and views, make quick changes to production or test databases, and populate test databases.
CA File Master Plus for IMS: User Basics 200 1 06FMS20090 This Course Will Show You How To: Access and personalize your CA File Master Plus for IMS environment Browse and edit IMS databases Filter data using selection criteria Use utilities
CA File Master Plus for IMS: User Basics in the Eclipse UI 200 .75 06FMS20100 This Course Will Show You How To: Access and personalize your CA File Master Plus for IMS environment Browse and edit IMS databases Filter data using selection criteria Use utilities
CA File Master Plus for DB2 for z/OS: User Basics 200 1 006FMS20140 This Course Will Show You How To: - Access and personalize your CA File Master Plus for DB2 for z/OS environment - Browse and edit DB2 databases - Filter data using selection criteria - Extract and reload DB2 data.
CA File Master Plus for DB2 for z/OS: User Basics in the Eclipse UI 200 .5 006FMS20150 This Course Will Show You How To: Browse and edit databases using the Eclipse UI
CA File Master Plus for MVS: User Basics 200 1.5 006FMS20160 This Course Will Show You How To: - Access and personalize your CA File Master Plus environment - Browse, edit, and manage sequential, Virtual Storage Access Method ( VSAM), and partitioned datasets - Filter data using selection criteria - Match copybooks to files with single or multiple record types - Create batch jobs to operate on files and data - Logically organize groups of datasets for easy access
CA File Master Plus for MVS: User Basics in the Eclipse UI 200 .5 006FMS20170 This Course Will Show You How To: Set up files you usually work with and perform utility functions. Browse and Edit Data Sets using the Eclipse UI. Create and update layouts and selection criteria using the UI.

CA IDMS™
Course Title Duration
(Hours)
Course ID Description
CA IDMS/DB r18.x: Managing Security 200 .75 06IDM20260 This course is designed to introduce the new Database Administrator (DBA) to database security so they can ensure the safety of their site’s data. Managing Security is the third of three courses designed for the new DBA.
CA IDMS/DB r18.x: Managing the CV Environment 200 1 06IDM20270 This course is designed to introduce the new Database Administrator (DBA) to Central Version (CV) management so that they will be able to extract the best performance from their CV. Managing the CV is the second of four courses designed for the new DBA.
CA IDMS/DB r18.x: Database Maintenance 200 3.5 06IDM20280 This course is designed to introduce the new Database Administrator (DBA) to database maintenance using CA IDMS/DB. Understanding database maintenance allows the DBA to effectively maintain the integrity of their organization’s data. Database Maintenance is the first of three courses designed for the new DBA.
CA IDMS/DB r18.x: Performance and Tuning 200 2.5 06IDM20300 This course is designed to introduce the new Database Administrator (DBA) to how to analyze the performance of the CV and execute any necessary tuning so that they will be able to extract the best performance from their CV. Performance and Tuning is the third of four courses designed for the new DBA. Keywords: IDMS, IDMS/DB, r18, Performance and Tuning.
CA IDMS v18: Concepts and Facilities 200 4 06IDM20140 This course will introduce you to the database concepts and capabilities of CA Integrated Database Management System (IDMS), CA IDMS. After mastering the vocabulary used in the CA IDMS environment, you will explore the tools available for data management and application development.
CA IDMS Web Services r19.x: Introduction 100 .75 06IDM10050 In this course, students will learn about Web Services, in particular, CA IDMS Web Services Consumer, and the new functionality offered.
SQL and Web Connectivity for IDMS and Datacom 1 06IDM20290 This course will cover the implementation of relational SQL language for these databases, as well as how to enable SQL-compatible connectivity to CA Datacom and CA IDMS data from Web, Java and Windows environments. It is designed to enable you to create efficient data-driven web-based and server-based applications with this technology.
CA IDMS™  Version 19.0: Web Services for Modernization .75 06IDM20490 The vision of CA IDMS 19.0 is to improve CA IDMS modernization capabilities through features that enable customers to expand investments in core CA IDMS applications and improve developer productivity using modern skills and industry-standard technology.
CA IDMS™ Version 19.0: SQL Enhancements for Modernization .75 06IDM20500 Customers need to leverage their investment in CA IDMS to create new applications based on services in the application economy, and they need to do this with current technologies and developer skill sets.   This session shows how SQL enhancements in CA IDMS 19.0 improve standards compliance, developer productivity, and compatibility with third party tools and applications.  The SQL virtual foreign key feature enables developers to use standard SQL to access and update network databases without the need to use network DML or table procedures.  Enhancements to SQL DDL enable users to define databases using standard DDL compatible with other databases.
CA IDMS REST API: APIs and Integration Using Open Source Monitoring Tools .25 06IDM20540 In this video, you will see how you can use popular open source tools to monitor database performance metrics exposed by Zowe APIs. With little or no coding you can collect data over time for deep analysis and develop dashboards to display performance graphically.
Using the CA IDMS MQ Adaptor to Enhance Connectivity with Other Applications 200 .5 06IDM20570 In this video, you will see the capabilities of the CA IDMS MQ Adapter and how it can provide a robust and cost-effective way to enable your CA IDMS online applications to communicate with other MQ applications.
CA IDMS™ Version 19.0: Implementation and Use of Generic VTAM Resources with Parallel Sysplex Features 1 06IDM10060 This session will cover the Generic VTAM Resource enhancement and Parallel Sysplex Features and how the two options combined can be leveraged to Improve 24X7 availability, balance workloads, and eliminate single point of failure for your CA IDMS systems.

CA Mainframe Application Tuner
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Application Tuner: Improving Application Performance Management .5 06MAT20030 This session will cover how to improve application performance management with CA Mainframe Application Tuner.
On Demand CA Mainframe Application Tuner Version 11: User Basics 200 1.25 06MAT20040 In this course, you will discover how to create and invoke monitor definitions and analyze monitored data so you can determine the underlying cause of performance issues and fine tune your applications for optimal performance.

CA Top Secret
Course Title Duration
(Hours)
Course ID Description
CA Top Secret ® for z/OS: Overview 200 .5 06TSS20010 This course will show you what types of data losses could happen in your environment and what is required to start CA Top Secret. You will also learn what happens when a user signs on to the system and you will become familiar with the high-level design philosophy of a security database.
CA Top Secret® for z/OS: Implementing Security Database Design 200 1 06TSS20020 This course will show you how to design your security database and create the basis for your security database structure by submitting the CREATE commands for ZONE, DIVISION, DEPARTMENT, and PROFILE ACIDs. You will also learn how to run a batch report that will list the database structure in part or in whole.
CA Top Secret ® for z/OS : Identifying Users to CA Top Secret 200 1 06TSS20030 This Course Will Show You How To: •Create user ACIDs with the necessary parameters for that ACID to be effective • Describe attributes and privileges and know when to use them. • Assign profile ACIDs to provide resource authorization and FACILITY access. • Describe additional commands to use when working with user ACIDs.
CA Top Secret® for z/OS: Using the Field Descriptor Table 200 .5 06TSS20040 This Course Will Show You How To: • Describe the Field Descriptor Table • Define entries in the Field Descriptor Table
CA Top Secret for z/OS: Using the Static Data Table 200 .25 06TSS20050 This Course Will Show You How To:•Describe the Static Data Table (SDT) record•Define Calendar and Time records
CA Top Secret for z/OS : Determining the Search Algorithm 200 .5 06TSS20070 This Course Will Show You How To: • Describe the search algorithm and how it is used. • Use the search sequence to assist with security administration. • Use TSSSIM to test the security file permissions.
CA Top Secret for z/OS : Protecting Other Resources 200 .5 06TSS20080 This Course Will Show You How To: Protect other resources beyond datasets and volumes.
CA Top Secret for z/OS : Using the Resource Descriptor Table 200 .25 06TSS20100 This Course Will Show You How To:• Explain how the Resource Descriptor Table (RDT) is used. • Define a new entry in the RDT.

CA MICS® Resource Management
Course Title Duration
(Hours)
Course ID Description
CA MICS r12.x: Installation Configuration and Operations 200 1 06MIC20140 This course provides an in-depth review of the rich suite of configuration parameters available for CA MICS implementation and customization. These parameters allow you to configure CA MICS to meet the challenges unique to your organizations resource management requirements.
CA MICS r12.x: Administration and Operations 2 06MIC20210 This course explains how to set up and implement the day to day processes used by CA MICS to process your IT data and populate the CA MICS database. The facilities available to extend CA MICS resource management data beyond the online database are covered, as well as the processes used to change your CA MICS configuration to meet your evolving IT requirements.
CA MICS r12.x: Reporting 200 1.5 06MIC20230 This course provides an in‐depth review of the facilities available to generate the reports and charts you need to manage your IT infrastructure and workloads. From ad‐hoc analysis through the creation of production reporting and web publishing,the course materials explain the rich reporting options available for extracting and visualizing the valuable information stored in your CA MICS database.
CA MICS Performance Series: Analysis of SAS BUFNO/PAGESIZE Options 200 .5 06MIC20240 This video will highlight best practices for SAS performance improvement for CA MICS batch processing by updating buffer parameters to exploit the latest software changes

Mainframe Resource Intelligence(MRI)
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Resource Intelligence: Overview Foundations 100 .25 06MRI10010 This Course Will Show You How To: Explain the value of CA Mainframe Resource Intelligence via a use case. Describe, at a high level, the what, why, and how of CA Mainframe Resource Intelligence. Explain how CA Mainframe Resource Intelligence gathers and secures your data.

CA OPS/MVS® Event Management and Automation
Course Title Duration
(Hours)
Course ID Description
CA OPS/MVS Mainframe Team Center -Automation Component Release 13.5:Overview 100 .25 06OPS10010 This Course Will Show You How To: Describe, at a high level, the purpose of Mainframe Team Center –Automation. Explain how Mainframe Team Center -Automation Rules Management and System State Manager functions help you easily monitor rule implementation and resource states across multiple systems.
CA OPS/MVS Event Management and Automation Components Release 13.5: Overview 100 .25 06OPS10020 This Course Will Show You How To: Describe, at a high-level, the business value of CA OPS/MVS. Explain the roles of the components, product integrations, and functionality that comprise CA OPS/MVS.
CA OPS/MVS Automation Point Overview 100 .25 06OPS10030 This Course Will Show You How To:  Take the simple recommended actions that help ensure a good product experience.  Explain the key product features and components.  Explain the product architecture.
CA OPS/MVS Automation Point Installation 200 .25 06OPS20010 This Course Will Show You How To:  Prepare to install CA OPS/MVS Automation Point.  Complete the CA OPS/MVS Automation Point server and client installation procedures.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Overview .5 06MVS20050 This course provides you with an overview of how SSM can be used to implement cross system resource management. At the end of this training, you will be able to describe how SSM works to control the state of managed system resources. This course is also available as part of CA OPS/MVS Event Management and Automation r12.x: System State Manager 200 Bundle. Course Code 06MVS2009B.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Implementations 200 1.5 06MVS20070 This course provides you with an understanding of how to implement SSM in your environment to manage system resources, specifically Started Tasks (STCs). At the end of this training, you will be able to perform basic SSM implementation to manage critical system resources.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Maintenance & Troubleshooting 200 .5 06MVS20080 This course provides you with an understanding of how to troubleshoot and maintain the basic SSM implementation in your environment as your environment changes. At the end of this training, you will be able to update SSM configurations as per changing environment needs and troubleshoot basic SSM implementation.

CA NetMaster
Course Title Duration
(Hours)
Course ID Description
CA NetMaster Network Management for TCP/IP Product Navigation 100 .5 06NMR10100 This Course Will Show You How To: - Log in to CA NetMasterNM for TCP/IP. - Navigate between menus using shortcuts and concatenated commands. - Explain how to use the Function keys to facilitate product navigation. - Display selection lists. - Access and use the Command Entry screen. - Access and navigate the Activity Log.
CA NetMaster Network Management for TCP/IP Tracing 200 .5 06NMR20130 This Course Will Show You How To:  Describe the purpose and benefits of using SmartTrace.  Explain the different SmartTrace types and their purpose.  Start a SmartTrace from a Connection List or from the IP Resource Monitor.  Perform a packet data search and decode packets.  Define, start, and stop a SmartTrace.  Save, Export, or Print a SmartTrace.  Generate an IPCS report.  Use the CTRACE data trace option.
CA NetMaster Network Management for TCP/IP Setup SmartTrace Security 200 .25 06NMR20150 This Course Will Show You How To:  Set up SmartTrace security to control access to packet payload data.
CA NetMaster Network Management for TCP/IP Network Diagnostics 200 .5 06NMR20160 This Course Will Show You How To:  Use the ping and traceroute functions to perform basic diagnostic tests.  Identify unsecured or improperly secured connections.  Troubleshoot slow response times.  Obtain diagnostic information about your connections.  Obtain IP security information to confirm that your IPSec is functioning as expected.
CA NetMaster® Network Management for TCP/IP: Customizer Overview – Parameters and the INIFILE 200 .5 06NMR20210 This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP administrators with the configuration parameters that occasionally require tuning. In addition, this course describes how using the INIFILE (initialization file) simplifies the process of updating the configuration of product regions across multiple LPARs.
CA NetMaster Network Management for TCP/IP: User ID Access Maintenance Subsystem Overview 200 .25 06NMR20220/td> This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP Administrators with the User ID Access Maintenance Subsystem (UAMS).
CA NetMaster® Network Management for TCP/IP: Business Application Overview 200 .25 06NMR20230 This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP Administrators with the process of manually defining and using a business application to categorize connections into groups based on criteria such as application or TCP/IP stack job name, local or remote port number, or remote address.
CA NetMaster Network Management for TCP/IP: Introduction to Event Detectors 200 .25 06NMR20260 This Course Will Show You How To:Identify the different types of event detectors.Monitor system events using event detectors
CA NetMaster Network Management for TCP/IP: Advanced Administration Tasks Overview 200 .25 06NMR20270 This Course Will Show You How To:Perform advanced alert configuration and administration.Manage printers.Work with activity logging.Explain how to use timer commands to schedule events.Customize commands.Create INI members.xplain the purpose of NCL.Identify useful product support commands

Security Insights Platform(SIP)
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Security Insights Platform: Overview 100 .5 06SIP10100 This course provides an overview of the CA Mainframe Security Insights Platform to help you understand the benefits it provides and how to create and view the reports.
CA Mainframe Security Insights Platform: Identify Who Has Access to Your APF Libraries 200 .25 06SIP20100 This course will teach you how to use the Security Insights use case: "Identify who has access to your APF libraries" to create a report and view the results.
CA Mainframe Security Insights Platform: Examine Classification & Pervasive Encryption 200 .25 06SIP20110 This course will teach you how to use the Security Insights use case: "Examine Classification and Pervasive Encryption by Resource" to create a report and view the results.

CA SYSVIEW® Performance Management
Course Title Duration
(Hours)
Course ID Description
CA SYSVIEW Performance Management Option for DB2 Overview 100 .25 06SYS10110 This Course Will Show You How To: - Explain the main functions of CA SYSVIEW for DB2. - Explain the CA SYSVIEW for DB2 architecture. - Select a subsystem to monitor - Navigate CA SYSVIEW for DB2. - Access the product help.
CA SYSVIEW Performance Management Option for DB2 Set Up Your User Profile 200 .25 06SYS20250 This Course Will Show You How To: - Define print destinations. - Allocate request libraries. - Define shortcut commands and PF keys.
CA SYSVIEW® Performance Management Option for DB2: Monitor Pool Metrics at the SSID Level 200 .25 06SYS20260 This Course Will Show You How To:  Monitor pool activity for the current interval.  Review pool activity for a selected historical interval
CA SYSVIEW® Performance Management Option for DB2: Monitor Application and Thread Performance 200 .5 06SYS20270 This Course Will Show You How To:  Navigate the active thread panels to obtain information to help diagnose issues with active threads.  Use accounting data to obtain more active and historical thread data.  Find and cancel problem threads.  Use thread history to identify recent threads that used excessive resources.
CA SYSVIEW® Performance Management Option for DB2: Monitor Current and Historical SQL Activity 200 .25 06SYS20280 This Course Will Show You How To:  Monitor real-time dynamic and static SQL statements.  View historical SQL activity.
CA SYSVIEW® Performance Management Option for DB2: Work with Probe and Trace Requests 200 .25 06SYS20290 This Course Will Show You How To:  Identify low-overhead and high-overhead trace requests.  Run a trace.
CA SYSVIEW® Performance Management Option for DB2: Use the Exception Monitor 200 .25 06SYS20300 This Course Will Show You How To:  Explain the purpose of the exception monitor.  Understand and execute the best practices for using predefined exceptions.  Update exceptions to proactively monitor DB2 subsystem, database, and application metrics.
CA SYSVIEW Performance Management Option for CICS: Advanced 300 1.5 06SYS30010 This Course Will Show You How To:Monitor CICS regions, Monitor CICS transactions, View CICS historical data, & View and set CICS thresholds and alerts

CA Vantage™ SRM
Course Title Duration
(Hours)
Course ID Description
CA Vantage™ SRM: Getting Started with the Mainframe Team Center - Management Interface 200 .5 06VSR20020 This Course Will Show You How To:  Navigate using the User Menu, Navigation Pane, and Dashboards  Explain the differences between public and private hosts  Create a private host  Understand factory dashboards versus user-defined public or private dashboards  Create and modify a dashboard  Export a dashboard chart  Import and export dashboard definitions  Customize object data collection and presentation  Evaluate, view, and perform actions on an object
CA Vantage™ SRM: Join Objects Using the Mainframe Team Center - Management Interface 200 .25 06VSR20030 This Course Will Show You How To:  Describe object join and join types  Use the wizard to created joined objects  Delete joined objects
CA Vantage™ SRM: Scripts & Event Servers in the Mainframe Team Center - Management Interface 200 .25 06VSR20040 This Course Will Show You How To:  Describe the differences between System, Audit, Log, and Automation scripts  Review script activity  View scripts and control their status
CA Vantage™ SRM: Object Logging & Trend Reports in Mainframe Team Center - Management Interface 200 .25 06VSR20050 This Course Will Show You How To:  Use the wizard to create log scripts  Modify or delete log scripts  Generate trend data from the logged data
CA Vantage™ SRM: General Object Automation in the Mainframe Team Center -Management Interface 200 .25 06VSR20060 This Course Will Show You How To:  Explain automation concepts  Describe General Object Automation (GOA)  Use the GOA wizard to define and customize Object Automation events
CA Vantage™ SRM: Create Summary Objects in the Mainframe Team Center - Management Interface 200 .25 06VSR20070 This Course Will Show You How To:  Describe the purpose of Summary Objects  Describe the different components that comprise a Summary Object  Create and delete a Summary Object
CA Vantage™ SRM: Monitor DFSMShsm in the Mainframe Team Center - Management Interface 200 .25 06VSR20080 This Course Will Show You How To:  Provide error reporting and correction for HSM functions  Produce summary and detail reports  Run HSM audits on the control data sets
CA Vantage™ SRM: Monitor Your CA Vantage Environment Using the Mainframe Team Center Interface 200 .25 06VSR20090 This Course Will Show You How To:  Monitor CA Vantage SRM operations  Identify the objects that you can use to analyze z/OS resources


TPX
Course Title Duration
(Hours)
Course ID Description
CA TPX ™ Session Management: Solution Overview 100 .25 06TPX10010 This course provides an overview of the CA TPX™ Session Management solution.
OnDemand CA TPX Session Management for z/OS: User Administration 200 1.25 06TPX20060 In this course, you will learn about CA TPX user administration, including access and security settings for the various roles. This course content is presented as an overview of the product and its features along with several interactive demonstrations.
On Demand CA TPX Session Management for z/OS: System Administration 200 1.5 06TPX20070 In this course, you will learn about CA TPX system administration, including resource tables, security setting and Printing. This course content is presented as an overview of the product and its features along with several interactive demonstrations.
CA TPX Session Management for z/OS: ACL/E 200 .5 06TPX20080 In this course, you will learn about using ACL/E (Automated Conversation Language - Extended) programs with CA TPX and how to use the major commands available for ACL/E programs. This course content is presented as an overview of the product and its features.

XCOM
Course Title Duration
(Hours)
Course ID Description
CA XCOM Data Transport: Installation 200 .5 06XCO20010 This course provides information on how to install CA XCOM Data Transport on a UNIX/Linux or Windows platform.
CA XCOM Data Transport: Configuration Parameters 200 .25 06XCO20020 This course provides information on configuration parameters available for CA XCOM Data Transport on a UNIX/Linux or Windows platform.
CA XCOM Data Transport: Maintenance 200 .25 06XCO20060 This course provides information on debugging, tracing, and maintenance for CA XCOM Data Transport on a UNIX/Linux or Windows platform.

CA Spool
Course Title Duration
(Hours)
Course ID Description
CA Spool: Migrating from CA Spool AFP Transformers to Java Transformers 200 .5 06SPO20010 This Course Will Show You How To:Understand the migration process.Explain the differences between the AFP and Java transformers.Customize the transformer parameter files.
CA Spool: Plug-in for ZoweCLI 200 .5 06SPO20020 This Course Will Show You How To:Explain the purpose of Zoweand Zoweplug-ins.Install and operate the CA Spool plug-in for the ZoweCLI.
CA Spool: Java Transformers Installation 200 1 06SPO20030 This Course Will Show You How To:Describe the CA Spool Java transformers and their benefits.Identify the software requirements for installing the Java transformers.Understand the installation process.Explain the post-installation steps

CA Workload Automation ESP
Course Title Duration
(Hours)
Course ID Description
CA Workload Automation ESP Edition: Overview 100 .25 06ESP10070 This course is designed to provide the next generation of CA WA ESP Edition users with an overview of the product architecture and terminology.
CA Workload Automation ESP Edition Foundations: Create Events 200 .25 06ESP20010 This Course Will Show You How To: Describe the purpose and function of events. Create, trigger, and simulate events in ISPF or the Workstation.
CA Workload Automation ESP Edition Foundations: Understanding Applications 200 .25 06ESP20020 This Course Will Show You How To: Explain the relationship between procedures and applications. Understand how application control-level statements determine when an application runs. Describe the concept of application generation. Identify the information that an application requires to run successfully.
CA Workload Automation ESP Edition Foundations: Understanding Procedures 200 .25 06ESP20030 This Course Will Show You How To: Describe the syntax that procedures support. Work with the CLANG syntax rules, constructs, and operators. Understand the calendar, job selection, symbolic variable, workload status, and system activity built-in functions.
CA Workload Automation ESP Edition Foundations: Customizing Applications 200 .25 06ESP20060 This Course Will Show You How To: Explain the differences between manual and external jobs. Describe the role of job details, job defaults, and optional predecessor specifications. Understand the purpose of release conditions, sub- applications, and the APPLJOB command. Describe the role of time dependencies and condition codes.
  »  CA Premium Videos Curriculum
Course Title Duration
(MM:SS)
Course ID Description
CA Deliver
CA Deliver r12.2: Checkpoint & Dynamic Report Enhancements 6:32 N/A This video describes the performance enhancements to the CA Deliver Dynamic Reports and enhancements to the CA Deliver Checkpoint feature.
CA Deliver: Analytics Deep Dive - Deliver - Part 3 7:10 N/A See how you can extract analytic data from the CA Deliver database.
DB2 Tools
Subsystem Analyzer for DB2 for z/OS: How to Use Getpage Sampling 3:50 N/A In this video, we explain the requirements and selection of the getpage sampling rate collection option for CA Subsystem Analyzer for DB2 for z/OS, Release 19 incremental and later. Getpage sampling reduces collection overhead significantly. Sample screen shots that show the getpage sampling rate are included.
CA Report Facility: Using Variables 1:12 N/A Often it is desirable to execute an SQL QUERY with a variable, for example different ranges of dates. This video, based on version 19, explains how CA Report Facility handles the parsing of variables into a QUERY.
CA Report Facility: Building a Tabulation Form 1:12 N/A In this short video, based on Version 19.0, we’ll introduce how to build a tabulation form.
CA Report Facility: Building a Query, Form and Procedure 3:36 N/A In this short video, based on Version 19.0, we’ll introduce how to build a query in CA Report Facility and then use that query to build a form and ultimately, a procedure.
CA File Master Plus
CA File Master Plus Release 9.1: Browse and Edit Datasets 2:46 N/A This CA File Master Plus Release 9.1 video demonstrates how to: Browse and Edit Data Sets.
CA File Master Plus Release 9.1: Create Custom Record Layouts 2:48 N/A This CA File Master Plus Release 9.1 video demonstrates how to: Apply layouts to view formatted data. Define and update a Custom Record Layout.
CA File Master Plus Release 9.1: Eclipse UI - Manage Files 4:32 N/A This CA File Master Plus Release 9.1 video demonstrates how to: Manage files and perform utility functions such as allocate, copy and compare in the Eclipse UI.
CA File Master Plus: Volinfo Utility 3:56 N/A In this short video, we’ll introduce the Volinfo utility. You will learn how to generate reports that show volume, extent and freespace information for your direct access storage device (DASD) volumes.
CA MIM Resource Sharing
CA MIM Resource Sharing Release 12.1: CA MIA Health Check – DDN 6:51 06MIM1009Y In this video you will see the CA MIA Delay, Detection, and Notification (DDN) Health Check feature. This video will include a brief overview of the DDN feature as well as a discussion of the prerequisites and activation of the feature.
CA MIM Resource Sharing Release 12.1: CA MII Conflict Message Enhancements 3:03 06MIM1007Y In this video you will see the new conflict message enhancements made to the CA MIM Resource Sharing Enhanced Contention Management Facility (ECMF). You will also see the required prerequisites for these enhancements.
CA MIM Resource Sharing Release 12.1: CA MII DISPLAY CONFLICT & DISPLAY ENQRESOURCE Enhancements 6:42 06MIM1008Y In this video you will see the new enhancements made to the DISPLAY CONFLICT and DISPLAY ENQRESOURCE commands. You will also see the required prerequisites, activation, MIMPLEX environmentals, and a brief demonstration of the commands in action.
CA MIM Resource Sharing Release 12.1: CA MII MIMQUERY Feature 7:16 06MIM1006Y In this video you will see the MIMQUERY Service that was added with the release of CA MIM Resource Sharing Release 12.1. You will also see the required prerequisites, activation, MIMPLEX environmentals, and a brief demonstration of the feature in action.
CA MIM Resource Sharing Release 12.1: CA MIM Health Check for Early Start 3:17 06MIM1012Y This video introduces you to the CA MIM Health Check for Early Start. The video provides an overview of the Early Start feature, the new Health Check for Early Start, prerequisites necessary for its implementation, and how to activate the Health Check.
CA MIM Resource Sharing Release 12.1: CA MIM Health Check for Hyperstar 3:29 06MIM1014Y This video introduces you to the CA MIM Health Check for Hyperstar. The video provides an overview of the HyperStar feature, the new Health Check for Hyperstar, prerequisites necessary for its implementation, and how to activate the Health Check.
CA MIM Resource Sharing Release 12.1: CA MIM Health Check for SMF Recording 3:08 06MIM1013Y This video introduces you to the CA MIM Health Check for SMF Recording. The video provides an overview of the SMF Recording feature, the new Health Check for SMF Recording, prerequisites necessary for its implementation, and how to activate the Health Check.
CA MIM Resource Sharing Release 12.1: Driver Hang Notification Enhancement 100 3:59 06MIM1011Y This CA MIM Resource Sharing, Release 12.1 video introduces the viewer to the CA MIM Driver Hang Notification. This video provides an overview of the Driver Hang Notification and a discussion of the new Driver Hang messages, abend code, and prerequisites necessary for its implementation.
CA MIM Resource Sharing: CA MIM Health Check for GDIF and GTAF Isolation 3:43 N/A This video, based on Release 12.5, introduces you to the CA MIM Health Check for GDIF and GTAF Isolation. The video provides an overview of the best practice, the new Health Check, prerequisites necessary for its implementation, how to activate the Health Check, and examples of the Health Check
CA MIM Resource Sharing: CA MIM Health Check for MIMINIT PAGEFIX=NO 3:45 N/A This video, based on Release 12.5, introduces you to the CA MIM Health Check for MIMINIT PAGEFIX=NO. The video provides an overview of the best practice, the new Health Check, prerequisites necessary for its implementation, how to activate the Health Check, and examples of the Health Check messages.
CA MIM Resource Sharing: Restart Manager and Dynamic Refresh Enhancements 7:20 N/A This video, based on Release 12.5, provides an overview of the enhancements to the Restart Manager and Dynamic Refresh features that were added with the release of CA MIM Resource Sharing Release 12.5. You will also see the required prerequisites, how to activate the new features, and a brief demonstration
CA NetMaster Network Management for TCP/IP
CA NetMaster Network Management for TCP/IP: Breaking Down the Resource Monitor Screen 4:57 06NMR1007Y This introductory video includes an overview of the TCP/IP Status Monitors in CA NetMaster. This video uses the IP Resource Monitor as an example, and provides an in-depth explanation of what the displayed data means.
CA NetMaster Network Management for TCP/IP: Currently Running NCL Procedures 2:34 06NMR1010Y This video shows you how to determine what NCL procedures are running in your region at any given time. The first example shows how to find out which NCL is running for the Alert Monitor, and the second example shows how to discover the same information for custom NCL procedures.
CA NetMaster Network Management for TCP/IP: How to Send the Internal Audit Trail to the Activity Log 1:17 06NMR1010Y This video includes the steps required to send the internal audit trail to the activity log.
CA NetMaster Network Management for TCP/IP: Primary and Line Commands in the IP Resource Monitor 4:42 06NMR1006Y This introductory video includes an overview of the most useful TCP/IP primary and line commands in the IP Resource Monitor, and offers an in-depth explanation of what the displayed data means.
CA NetMaster Network Management for TCP/IP: Solve Subsystem Interface Commands 8:12 06NMR1005Y This video includes an overview of the TCP/IP Solve Subsystem Interface (SSI) commands, giving a brief explanation of what the displayed output means for each of them various commands.
CA NetMaster Network Management for TCP/IP: The Ins and Outs of the Customizer (/PARMS) 4:45 06NMR1008Y This video shows how to use the NetMaster for TCP/IP Customization Parameters commands, and explains how the resources are affected/modified. This video uses the $NM ALERTHIST resource as the example.
CA NetMaster Network Management: Ping & Traceroute Page 6:20 NA In this short video, we’ll introduce the new Ping & Traceroute page in CA Mainframe Team Center - Network Management. You will learn how to access and use the Ping & Traceroute functions for initial network communications troubleshooting from within this browser-based UI. This video also points out additional uses and special features of the Ping & Traceroute page.
CA NetMaster Network Management: IP Stacks 6:18 NA In this short video, we’ll introduce the IP Stacks page in Mainframe Team Center – Network Management. You will learn how to view traffic type statistics, performance history, and routing table details. This information can help network administrators make decisions to effectively manage network resources by currently running applications.
CA NetMaster Network Management: Alerts Monitor 7:05 NA In this short video, we’ll introduce the Alerts Monitor in CA Mainframe Team Center – Network Management. You will learn how to search through your alerts, view alert details, and take actions based on these alerts, such as changing Severity levels.
CA SYSVIEW
CA SYSVIEW Perf Mgmt V14.1: CICS Transactions That Performed Poorly 2:14 06SYS1018Y This video shows you how to use the CREVIEW command to find CICS transactions that have performed poorly.
CA SYSVIEW Perf Mgmt V14.1: IMS Transactions That Performed Poorly 2:34 06SYS1019Y This video shows you how to use the IMSTLOG command to find IMS transactions that have performed poorly.
CA SYSVIEW Performance Management 14.0: Abended CICS Transactions 2:09 06SYS1017Y This video shows you how to use the CTRANLOG command to find CICS transactions that have abended.
CA SYSVIEW Performance Management 14.0: Viewing CICS Transactions 2:11 06SYS1016Y This video shows you how to find what CICS transactions have run within a selected time period.
CA SYSVIEW Performance Management 14.1: Abended IMS Transactions 2:15 06SYS1011Y This video shows you how to find IMS transactions that have abended using the IMSTLOG command.
CA SYSVIEW Performance Management 14.1: LCASSIST Feature 5:01 06SYS1013Y This video shows you how to use the line command assist feature to see the actions and navigations available for the rows of data on a CA SYSVIEW display.
CA SYSVIEW Performance Management 14.1: Sorting Data 4:08 06SYS1015Y This video shows you how to sort the data in a CA SYSVIEW display to view data in the order that is most useful to you.
CA SYSVIEW Performance Management 14.x: Anatomy of a Display 4:37 06SYS1009B This video describes the basic components of the default display in CA SYSVIEW Performance Management.
CA SYSVIEW Performance Management r14.x: Finding Help 2:28 06SYS1009B This video shows different methods of finding help for any questions that arise when using CA SYSVIEW Performance Manager.
CA SYSVIEW Performance Management r14.x: Navigating 4:36 06SYS1009B This video demonstrates how to use menus and primary commands to navigate CA SYSVIEW Performance Manager.
CA SYSVIEW Performance Management r14.x: Scrolling 5:28 06SYS1009B This video shows you how to scroll in CA SYSVIEW to be able to see all available data on every screen in a CA SYSVIEW display.
CA SYSVIEW Performance Management14.0: Selecting and Filtering Data 4:41 06SYS1014Y This video shows you how to better work with information on a CA SYSVIEW display by selecting and filtering the data that is displayed.
CA SYSVIEW Performance Mgmt V14.1: Using CICS EXEC Interface Trace Cmd 5:28 06SYS1012Y This video shows how to trace CICS transactions using the CICS Exec Interface Trace Command.
CA View
CA View and CA Deliver r12.2: Passphrase Support 6:43 N/A This video describes the CA View and CA Deliver Jobsmode feature, which enables the use of password phrases to authenticate a user, extending the security and usability aspects of CA View and CA Deliver.
CA View r12.2: Job Mode 15:38 N/A This video describes the CA View Job mode feature, which is the new online mode that provides improved search, list, view, print, and email functions for operational data such as jobs and logs.
CA View r12.2: Print and Email via CA Spool 5:12 N/A This video describes how you can set up the support to print and email in CA View via CA Spool.
CA View® Version12.2: ARCHCHG Enhancements 8:05 N/A This video describes the enhancements to the ARCHCHG parameter, which enables a user exit to be coded to change the archive date and time of a report.
CA View® Version12.2: SARGRW Report Writer 5:35 N/A This video describes CA View SARGRW Report Writer, which is a general purpose reporting utility that uses free format control statements to obtain information from database records.
CA View® Version12.2: SARSAM Database Access Method 5:57 N/A This video describes the CA SARSAM database access method, which enables you to find programs running under MVS to access the View database, to retrieve indexes, sysouts, and panel data.
CA View: Analytics Deep Dive - SARGRW - Part 1 5:54 N/A Using the CA View new report writer SARGRW, you can now easily extract Analytic type metrics from the CA View Database.
CA View: Analytics Deep Dive - Other Tools - Part 2 4:26 N/A See what other tools are available are available to CA View to extract metric data.
CA Workload Automation iDash
CA Workload Automation iDash v12.0.01: Auto Import of CA WA AE Archive Data 7:34 N/A With the incremental release 12.0.1, CA Workload Automation iDash now supports the ability to automatically import CA Workload Automation AE archive data.
CA Workload Automation iDash v12.0.01: CA7 SLA with SCHID=0 6:08 N/A With the incremental release 12.0.1, CA Workload Automation iDash now supports the ability to create a single CA7 SLA with SCHID=0 with the capability to override for specific SCHIDs. This video will show you how to create the SLA with SCHID=0.
CA Workload Automation iDash v12.0.01: Support for CA 7 Job Links 5:50 N/A With the incremental release 12.0.1, CA Workload Automation iDash now supports CA 7 Job links. This video will show you how to configure these job links.
CA Workload Automation iDash v12.0: Create a Custom Search 3:44 N/A This video shows you how to create a custom search in CA Workload Automation iDash Version 12.0. It will also help you to edit a custom search and save a modified custom search.
CA Workload Automation iDash v12.0: Create an SLA for a CA WA AE Job 8:30 N/A This video shows you how to create an SLA for a CA Workload Automation AE job in CA Workload Automation iDash Version 12.0. It will also help you to set SLA date scheduling and time conditions, search and filter jobs, and display job runs.
CA Workload Automation iDash v12.0: Create an SLA for a CA WA CA7 Job 10:30 N/A This video shows you how to create an SLA for a CA WA CA7 Edition job in CA Workload Automation iDash Version 12.0. It will also help you to set SLA date scheduling and time conditions, search and filter jobs, and display job runs.
CA Workload Automation iDash v12.0: Create an SLA from the CLI 8:10 N/A This video shows you how to create an SLA from the command-line interface (CLI) in CA Workload Automation iDash Version 12.0. It will also help you to set various parameters for the idlist and idupdate commands and modify the SLA definition file.
CA Workload Automation iDash v12.0: Create SLA Reports 12:56 N/A This video shows you how to create SLA reports using the Web interface and the command-line interface (CLI) in CA Workload Automation iDash Version 12.0. It will help you to publish SLA reports in a variety of formats, including HTML and PDF.
CA Workload Automation iDash v12.0: Create Tags and Associate SLAs 7:40 N/A This video shows you how to create tags and associate them to SLAs in CA Workload Automation iDash Version 12.0. It will also help you to edit and nest tags.
CA Workload Automation iDash v12.0: Customize My Watchlist 2:04 N/A This video shows you how to customize My watchlist in CA Workload Automation iDash Version 12.0. It will also help you to display the hierarchy of tags in My watchlist and filter the SLA list by tags.
CA Workload Automation iDash Version 12.0: Monitor SLAs 12:40 N/A This video shows you how to monitor SLAs from Dashboard and Explorer pages in CA Workload Automation iDash Version 12.0. It will help you to monitor SLAs by working with alerts, customizing the SLA list, and using the Flow, Time, and Table views.
CA XCOM Data Transport
CA XCOM Data Transport for Windows: Upgrade Installer 10:43 N/A This CA XCOM Data Transport, Release 11.6 SP01, video provides an overview of how to upgrade CA XCOM from Release 11.6 to Service Pack 01.
CA XCOM Data Transport: Character Conversion 3:07 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of character conversion process.
CA XCOM Data Transport: General Overview 3:01 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of CA XCOM Data Transport and how the architecture functions.
CA XCOM Data Transport: How to Create a RRDS File 2:35 N/A This CA XCOM Data Transport for z/OS, Version 12.x, video provides an overview of how to create a VSAM RRDS file.
CA XCOM Data Transport: How to Setup and Run a SSL Transfer Job 10:47 N/A This CA XCOM Data Transport for z/OS, Version 12.x, video provides an overview of how to setup and execute a SSL Transfer job.
CA XCOM Data Transport: How to Setup and Run and Inquire Job 6:44 N/A This CA XCOM Data Transport for z/OS, Version 12.x, video provides an overview of how to setup and execute a TYPE=INQUIRE job.
CA XCOM Data Transport: How to Start an XCOM Server and Edit the Configuration File 5:22 N/A This CA XCOM Data Transport for z/OS, Version 12.x, video provides an overview of how to start an XCOM server and edit the configuration file.
CA XCOM Data Transport: Rescheduling Direct Transfers 4:28 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of how CA XCOM Data Transport handles the rescheduling of Direct Transfers.
CA XCOM Data Transport: Translation Tables 10:41 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of Translation Tables used in converting between ASCII and EBCDIC languages.
CA XCOM Data Transport: Types of Transfer 3:51 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of the various available transfer types.
CA XCOM Data Transport: Working without SNA 4:38 N/A This CA XCOM Data Transport, Version12.x, video provides an overview of how to perform transfers without SNA.
CA XCOM Data Transport for Linux SP01: Upgrade Installer 11:18 N/A This CA XCOM Data Transport, Release 11.6 SP01, video provides an overview of how to upgrade CA XCOM Data Transport from Release 11.6 to Service Pack 01.
CA XCOM Data Transport for Linux PC: Transfer Files between Systems 7:43 N/A This CA XCOM Data Transport video provides an overview of sending and receiving files on Linux/UNIX based machines in GUI, Command Line, Configuration File and XML Configuration file from your local system to a remote system and the other way around.
MIM
CA MIM™ Resource Sharing Release 12.1: Dynamic Refresh 4:22 N/A This video show you how to use the Dynamic Refresh feature to dynamically refresh or switch the MIM load library without stopping and restarting the MIM address space or taking a system outage.
CA Endevor SCM
What's new in CA Endevor V17? 7:00 N/A This video explains CA Endevor Software Change Manager’s new Incremental Release Program as well as the new features that are offered with the first incremental release.
CA Endevor Software Change Manager - Eclipse Based UI: Getting Started 7:00 N/A This informational video will demonstrate how to install the CA Endevor SCM Eclipse plug-in, connect to Endevor, and start using Eclipse.
CA PLEX
CA Plex Release 7.x: Introduction for 2E Developers 100 8:01 N/A This video introduces 2E customers to the benefits that CA Plex has to offer.
CA Data Content Discovery (DCD)
CA Data Content Discovery for z/OS: Data Risk & Product Discussion 7:14 N/A In this video we will discuss myth versus reality regarding protection of at-risk mainframe data, impact/costs of data theft, and we'll introduce CA Data Content Discovery.
ACF2
CA ACF2™ for z/OS: Enable Generic Signon Messaging 4:32 N/A This video, based on Version 16.0, introduces the GSO MSGOPTS record, which lets you enable generic signon messaging to safeguard against malicious hackers. The video provides an overview of enabling this messaging, reviews the affected product messages, discusses the MSGOPTS fields, and demonstrates how to enable the generic signon messaging.
Workload Automation
CA Workload Automation CA 7 Edition Version 12: Release Overview 8:02 N/A This video offers a short review of the main features in CA Workload Automation CA 7 Edition Version 12.0.
CA Workload Automation CA 7 Edition: JRENAME Command 3:56 N/A In this video, based on version 12, you will learn how issue a CA Workload Automation CA 7 Edition Topline command to rename a single job and all of its associated job elements.
  »  CICS v5.3
Course Title Duration Description
CICS TS Operations Series
CICS TS - Introduction
4 The CICS TS - Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated.
CICS - Explorer Fundamentals
3 This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered.
CICS TS - Controlling CICS Operations
6 The Controlling CICS Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems.
CICS Command Simulations
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS.
CICS TS Programmers Series
CICS - Programming Basics
6 The CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product.
Program Control and Communication
6 The CICS Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas.
Files and Databases
4 This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2.
Storage and Transient Data
4 This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues.
Programming for Web Access
4 This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them.
Using CICS Transaction Gateway
3 This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS.
CICS Terminal Communications
6 The CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment.
Using SDF II To Maintain CICS TS Maps
2 This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps.
Programming for Recovery
3 This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery.
Debugging CICS Programs
4 The Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces.
  »  Coaching and Mentoring for Technical Specialists
Course Title Duration Description
Coaching and Mentoring for Technical Specialists
2 The Coaching and Mentoring for Technical Specialists course begins by explaining how learning has evolved from the traditional on-the-job and classroom training, to a myriad of learning resources to suit a wide range of people. Coaching and mentoring are introduced, describing how they differ and the benefits they can provide. These items are then discussed in more detail outlining various coaching and mentoring models, and how they can be implemented and managed. Several scenarios involving technical coaching and mentoring are presented, allowing you to relate to how these types of programs can run in your environment.
  »  Cloud Computing
Course Title Duration Description
Cloud Computing for Data Centers
5 The Cloud Computing for Data Centers course discusses the evolution of cloud computing and provides you with sources for obtaining additional cloud skills and knowledge. The attributes, and pros and cons of various cloud computing services is supplied and a description of in-house and outsourced cloud deployment models is provided. The final module uses the skills and knowledge you have attained, to create a business case and project plan for a cloud computing project.
  »  COBOL Programming
Course Title Duration Description
COBOL Programming - Basics
6 The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions.
Data and Datafile Definitions in COBOL
4 The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways.
COBOL Programming – Manipulating Data
6 The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index.
COBOL Programming - Advanced
5 The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program.
COBOL - IBM Enterprise COBOL 6.3 for z/OS
4 The COBOL - IBM Enterprise COBOL 6.3 for z/OS course is designed for learners with a basic understanding of generic COBOL who need to extend its use to the z/OS environment. It describes how COBOL programs are made available through compile and bind processes and discusses coding and options specific to the z/OS environment. The use of IBM's Language Environment is presented, and a number of coding techniques used to improve the performance of COBOL running on z/OS, is also shown.
Accessing IMS Databases from COBOL
3 The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained.
  »  Cryptography Curriculum
Course Title Duration Description
Cryptography
1 This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption has only recently become a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z14 infrastructure are provided, describing how at-rest, and in-flight data associated with those components supports new and existing encryption capabilities.
  »  Data Analysis, Analytics, and Machine Learning Curriculum
Course Title Duration Description
Big Data, Hadoop, and Analytics
4 This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organizations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data.
Machine Learning and Spark 4 This course is designed for those working with organizations looking to implement Machine Learning solutions. It is also of benefit for those looking to implement Spark on z/OS. It begins by explaining what Machine Learning is, how it works, and how organizations can benefit from it. The course then focuses on IBM's Machine Learning for z/OS solution, describing its features and components. In the final course, a description of Apache Spark and how it is used in a Machine Learning solution on a z/OS system, is presented.
  »  Database - Db2 v11
Course Title Duration Description
Db2 Operations Series

Note: Db2 v10 is also available.
Db2 Fundamentals
5 The Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI.
Managing Db2 Operations
4 The Managing Db2 Operations course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart.
Db2 - Database Management System Series
Introduction to RDBMSs and Db2
4 The Introduction to RDBMSs and Db2 course describes from a Database Administrator's (DBA) viewpoint how Db2 is used and the types of Db2-related tasks that the DBA performs. The course also looks at Db2's system configuration requirements and how it is implemented in a z/OS environment.
Manage Data Definitions with Db2
6 The Manage Data Definitions with Db2 course describes how SQL is used to define a Db2 database and its associated objects. It looks at SQL statement syntax and the methods used to invoke SQL statements.
Db2 SQL Fundamentals
4 (Previously titled Manage Data with Db2 SQL in the v10 Curriculm) The Db2 SQL Fundamentals course looks at some of the more common SQL statements used by programmers when starting out. It addresses the code used to obtain Db2 table data, sort it, as well as methods used for inserting, deleting, updating and merging table data.
Advanced Db2 SQL
4 The Advanced Db2 SQL course discusses some of the more advanced SQL code used to manipulate table data. Various methods used for joining tables is presented, along with examples of SQL statements and subqueries used to filter data results.
Create and Maintain Db2 Programs
6 The Create and Maintain Db2 Programs course describes how SQL is invoked from an application program and the interaction that can occur between the application program and Db2. This course also discusses how a Db2 COBOL Program is created.
Db2 Stored Procedures
3 The Db2 Stored Procedures course describes how stored procedures are used and the platforms on which they can be implemented. The benefits derived from using stored procedures are discussed as well as security implications associated with them.
Optimize Db2 Application Performance
5 The Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyse their effectiveness.
  »  Database - Db2 v12
Course Title Duration Description
Db2 Operations Series

Db2 - Db2 Fundamentals V12
5 The Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI.
Db2 - Managing Db2 Operations V12
4 The Managing Db2 Operations course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart.
Db2 - Database Management System Series
Db2 - Introduction to RDBMSs and Db2 V12
4 The Introduction to RDBMSs and Db2 course describes from a Database Administrator's (DBA) viewpoint how Db2 is used and the types of Db2-related tasks that the DBA performs. The course also looks at Db2's system configuration requirements and how it is implemented in a z/OS environment.
Db2 - Manage Data Definitions with Db2 V12
6 The Manage Data Definitions with Db2 course describes how SQL is used to define a Db2 database and its associated objects. It looks at SQL statement syntax and the methods used to invoke SQL statements.
Db2 - Db2 SQL Fundamentals V12
4 The Db2 SQL Fundamentals course looks at some of the more common SQL statements used by programmers when starting out. It addresses the code used to obtain Db2 table data, sort it, as well as methods used for inserting, deleting, updating and merging table data.
Db2 - Advanced Db2 SQL V12
4 The Advanced Db2 SQL course discusses some of the more advanced SQL code used to manipulate table data. Various methods used for joining tables is presented, along with examples of SQL statements and subqueries used to filter data results.
Db2 - Create and Maintain Db2 Programs V12
6 The Create and Maintain Db2 Programs course describes how SQL is invoked from an application program and the interaction that can occur between the application program and Db2. This course also discusses how a Db2 COBOL Program is created.
Db2 - Db2 Stored Procedures V12
3 The Db2 Stored Procedures course describes how stored procedures are used and the platforms on which they can be implemented. The benefits derived from using stored procedures are discussed as well as security implications associated with them.
Db2 - Optimize Db2 Application Performance V12
5 The Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyse their effectiveness.
  »  Data Center Storage Management 2.4
Course Title Duration(Hours) Description
Storage - Introduction to Storage and Disk Systems 2.4
3 This course describes how data center storage has evolved and its future in this environment. It then focuses on the hardware and software that comprises today's disk systems and how this meets the need of the data center.
Storage - Understanding Tape Storage 2.4
3 This course discusses how tape usage in data centers has evolved and looks at the purpose of this medium in today's environment. An overview of tape storage capabilities is discussed before looking at the emergence of virtual tape and how it is either replacing traditional tape systems, or working with them, to meet the data storage demands of the enterprise.
Storage - Networks, Administration, and DASD Management Using ICKDSF 2.4
4 This course provides an overview of network storage configurations and the monitoring and management tasks associated with the Storage Administrator role are also discussed.
Storage - Managing z/OS Data Using DFSMS Constructs 2.4
5 This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment.
Storage - Storage and Tape Administration Using DFSMShsm and DFSMSrmm 2.4
3 Initial content discusses space administration needs looking at data center backup and migration requirements, and then showing how this is achieved using DFSMShsm. The management of tape volumes and labels using DFSMSrmm is also covered in detail.
  »  DevOps and Agile
Course Title Duration Description
DevOps Fundamentals
2 The DevOps Fundamentals course discusses how today's successful business strategies evolve around continuous improvement practices, and how implementing a DevOps environment can partly achieve this goal. Pre and post DevOps scenarios are examined, looking at the structure and characteristics of this environment. Several DevOps-related surveys are examined as well as a number of case studies involved with DevOps adoption. Cultural changes associated with implementing DevOps are discussed, including challenges in this area. Finally, a wide range of commonly used DevOps-related automation tools and their purpose are presented.
Agile Fundamentals
1 The Agile Fundamentals course discusses the business value of adopting an Agile philosophy, introducing a real-life software development project, and describing how Agile is used to restructure traditional software development and deployment tasks. The values and principles associated with the Manifesto for Agile Software Development are explained, while an overview of common frameworks used to adopt Agile philosophes is provided, along with their benefits. Additional Agile training, accreditation, and related supported products and practices are also mentioned throughout the course.
  »  Disaster Recovery
Course Title Duration Description
Ensuring Data Center Business Continuity
3 This course begins by immersing the learner in a full scale disaster, getting them to think about all the elements involved in not only recovering data, but also ensuring that the overall business runs as per expectations. It then describes what business continuity is, citing well known events, and where disaster recovery fits in. The course is then extended to explain common business continuity strategies and looks at standards, in particular ISO22301, to see how current standards tackle this important facet of business life.
  »  IBM Explorer for z/OS 3.2
Course Title Duration Description
z/OS Explorer - IBM Explorer for z/OS
2 The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of the Remote System Explorer (RSE), z/OS and Resource perspectives, and the related views used to display and manage z/OS data.
  »  IBM Mainframe Communications 2.4
Course Title Duration Description
IBM Mainframe Communications Concepts
5 The IBM Mainframe Communications Concepts course provides an overview of traditional SNA and TCP/IP communication protocols and the logical and physical components associated with them.
VTAM Commands
5 The VTAM commands course discusses the use of commands to display the status and attributes of VTAM resources. An explanation of the processes used to start, activate, deactivate and stop VTAM resources is also provided.
Mainframe TCP/IP Commands
5 The Mainframe TCP/IP Commands course describes how TCP/IP runs on the mainframe and provides several scenarios where TCP/IP daemon, client application and server application commands are used.
VTAM Command Simulations
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM.
  »  IBM Mainframe Performance and Capacity Management
Course Title Duration Description
Z Performance - Introduction to Mainframe Performance
3 The Introduction to Mainframe Performance course provides the learner with a core understanding of what performance measures are required when managing a mainframe environment. Measuring the usage of critical resources is discussed, and potential issues that can affect the performance of tasks running in a z/OS system are presented.
Z Performance - z/OS I/O Performance and Capacity Planning
3 In this course you will examine the I/O process and see how I/O performance problems are detected, and the metrics used to determine where a problem may exist. Methods used to improve I/O performance are also discussed. Following this, an introduction to z/OS capacity planning is presented, describing the data required to identify future system growth and tips that can be used to better utilize existing resources before considering hardware or software purchases.
Z Performance - z/OS Performance Tools and Software Pricing
2 In this course you will discover how SMF is used to capture important system activity and store it as specific record types. You will see how these records are structured and the utilities used to convert their content into a readable format. Commands used to display, configure and manipulate SMF are covered, as well as the process of archiving SMF records and creating your own SMF records. Following this, an introduction to software licensing is presented, describing common licensing models and the metrics they use to determine the cost to the customer. This information will assist the user in determining ways to minimize software licensing costs.
Z Performance - z/OS Workload Manager
3 The Z Performance - z/OS Workload Manager course provides the learner with steps describing how WLM components are created and linked, to form a WLM policy. The course then progresses to discussing in detail various workloads and the goals and importance that should be assigned to them. This is followed by an overview of performance information that can be obtained through SMF records, MVS commands, and SDSF.
  »  IBM MQ
Course Title Duration Description
IBM MQ - Introduction to IBM MQ
4 This course provides the learner with basic information about IBM MQ, initially describing how it is used and then branching out discussing its features. A detailed breakdown on IBM MQ components and their structure are provided, providing you with an overview on how it could be configured in your environment. Finally, the use of IBM MQ in a z/OS environment is covered with details on how it differs from other platforms.
IBM MQ - MQ Operations and Administration
6 This course begins by describing IBM MQ, and its common deployment options, and then is expanded to show how an IBM MQ queue manager is created. Various commands used to interact with MQ components are discussed throughout the remaining content, showing how definitions are created and displayed, and modifications that can be made to them. A focus on the security of MQ resources and authentication required to access them, is also presented.
IBM MQ - MQ Operations and Administration for z/OS
4 This course looks at the differences between traditional MQ, and how it is implemented and run in a z/OS environment. It discusses the use of z/OS datasets and files that need to be created as well as the procedures used to enable MQ in z/OS. You will see how traditional MQ commands map to z/OS, and how MQ resources are managed using z/OS online facilities and batch utilities. Security for MQ resources on z/OS is examined along with tools and utilities used for monitoring aspects of MQ performance.
IBM MQ - MQ for Application Programmers
4 This course begins by identifying the basic programming code used by applications to interact with IBM MQ. It describes the MQ messaging process and then delves more heavily into the commands that can be used to get and put MQ messages, and manage MQ objects. Details on programming with MQ in a z/OS environment is provided, explaining core differences when using that platform.
  »  IBM Z System Automation Curriculum
Course Title Duration Description
SA z/OS - Introduction to IBM Z System Automation
1 The Introduction to IBM Z System Automation course provides the learner with a basic understanding of what IBM Z System Automation is and how it can be used in today’s modern enterprise. The course begins with looking at some of the benefits the product provides in managing system resources through automation. The course also covers the various components that enable automation functionality. Finally, the course delves further into what tools are available for IT personnel to interact with use with IBM Z System Automation.
SA z/OS - IBM System Automation: Planning, Installation, and Customization
3 The SA z/OS - IBM System Automation: Planning, Installation, and Customization course, takes the user through the steps required to install, and configure SA z/OS V4.2 onto their system. Initial content covers implementation considerations, and provides the learner with tools used in the planning and installation process. The configuration assistant section describes how some of these implementation tasks can be automated. The Customization Dialog module describes how this product is used to build an SA z/OS automation policy database. It guides the learner through the creation of database entries, to the compilation of the Systems Operations Configuration File, enabling it for distribution and use by an automated system.
SA z/OS – IBM System Automation: Operations
3 The SA z/OS - IBM System Automation: Operations course, focuses on the SA z/OS administration and monitoring tasks performed by operations and administrator personnel. Initial content looks at initializing SA z/OS, and describes start-up options that can be invoked for the automation manager and automation agent. Tasks that allow you to refresh automation configuration data, and enable automation through the use of automation flags, pacing gates and runmodes is also discussed. SA z/OS functionality that may unintentionally inhibit automation activity, and how these issues are resolved is also covered.
SA z/OS - Automation Definitions Introduction and Workshop
3 The SA z/OS - Automation Definitions Introduction and Workshop course, begins by describing the key Entry Types that can be defined in an SA z/OS policy database, and their purpose. Following this, a workshop-style module provides you with hands-on exercises used to create an application, application group and related automation definitions.
SA z/OS - Advanced Automation and Reporting
4 The SA z/OS - Advanced Automation and Reporting course, introduces the learner to some more advanced implementation and configuration possibilities focusing on end-to-end automation, and the automation of CICS, IMS, and Db2 environments. It also looks at various methods used to report on the policy database content, automation activity, and statistics produced by SMF relating to automation usage.
  »  IMS (Information Management System)
Course Title Duration Description
IMS v15 Series
IMS 15 Introduction
5 The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts.
IMS 15 Commands
4 The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided.
IMS 15 Databases
4 The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations.
IMS 15 Transaction Manager for Programmers
4 This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use.
  »  Introduction to the IBM Environment 2.4
Course Title Duration
(hours)
Description
Introduction to the IBM Enterprise Environment
4 This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe.
z/OS Systems Programming Fundamentals
6 This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues.
IBM Development Environment
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented.
  »  Java Programming
Course Title Duration Description
Java on z/OS for Java Programmers
1 This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere.
Java Introduction for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment.
Java Programming for the IBM Enterprise
7 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent.
Java Data Access for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems.
  »  JCL 2.4 (Job Control Language)
Course Title Duration
(hours)
Description
JCL (z/OS) – Introduction to z/OS JCL
3 The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.
JCL (z/OS) – JCL Coding Basics - JOB and EXEC Statements
4 This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.
JCL (z/OS) - JCL Coding Basics - DD Statements
6 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones. It also looks at the coding for printed output and job sysout.
JCL (z/OS) - Advanced JCL Data Set Use
5 The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.
JCL (z/OS) - Controlling Job and Step Processing
3 This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.
JCL (z/OS) - Working with Procedures and Symbols
3 This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.
JCL (z/OS) - Running and Debugging JCL
3 This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.
JCL (z/OS) – Advanced - Tips & Tricks
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with z/OS 2.2, 2.3, 2.4 and provides details on statements and parameters that have evolved over the last few years.
Course Title Duration Description
Introduction to Linux
5 The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed.
The Linux File System
5 The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed.
Editing with VI
4 The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided.
Linux Shell Programming
4 The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors.
Linux Operations
4 The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization.
Linux on IBM Z Fundamentals
5 The Linux on IBM Z Fundamentals course discusses available Linux distributions for the IBM Z environment, its operational implementation, and the general monitoring and management of Linux. The final module provides an overview of the performance monitoring and management tasks performed by the Linux Administrator, and contains tips for best practice in these areas.
  »  Mainframe Application Performance Curriculum
Course Title Duration
(Hours)
Description
Introduction to Sampling Performance Tools 1 This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions.
Mainframe Application Performance Tuning 1 A general introduction to mainframe application performance. In this course, you will be introduced to the basic concepts of improving application performance by tuning. This course includes suggestions on when and why to tune, tuning for CPU vs service time, and also considers batch and online performance objectives.
  »  Managed File Transfer Curriculum
Course Title Duration
(Hours)
Description
Managed File Transfer for Operations
3 This course describes how file transfer requirements have grown in importance over the years to the point where it has become an integral part of the daily workload processing. It then focuses on the elements of file transfer covering security aspects such as encryption and hashing algorithms as well as discussing the pros and cons of popular file transfer protocols. This knowledge is paramount when needing to manage and monitor a file transfer environment. The final part of this course discusses the common features associated with general Managed File Transfer (MFT) products, looking at tasks that need to be undertaken to ensure that compliance, internal regulations and SLAs are met, and that data integrity and security is maintained.
  »  Parallel Sysplex Curriculum
Course Title Duration
(Hours)
Description
Parallel Sysplex - Fundamentals 2.4
3 This course begins by describing how the Parallel Sysplex evolved and why it is integral component of today's enterprise IT environment. Its key features are discussed in terms of the benefits it provides to the organization - system availability, data integrity, workload and data sharing, and automated recovery to name a few. A break-down of the major Parallel Sysplex components is then presented, describing their importance and how they can be configured.
  »  PL/1 Programming
Course Title Duration Description
PL/1 Fundamentals and Data Representation
5 The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language.
PL/1 Program Design Techniques
5 The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions.
PL/1 Accessing Data in Files
5 The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions.
PL/1 Preprocessor, Debugging and Advanced Coding
5 The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language.
  »  Rational Developer for System z
Course Title Duration Description
Rational Developer for System z Basics
4 This course introduces the learner to the IBM Rational Developer for System z (RDz) product describing the general tasks that can be performed using it, as well as its configuration and other features. A guide to RDz's GUI interface is provided including details on connecting to resources on a host system.
Creating and Managing Applications Using RDz
4 This course describes the methods used to create, manage and maintain applications under RDz. It provides details on the benefits of projects and subprojects within RDz and the application tasks that can be performed within this structure. RDz testing and debugging capabilities are discussed in detail, in particular the zUnit testing framework, and the IBM Integrated Debugger. The final module addresses the RDz features that allow you to create applications for Db2, CICS and IMS.
  »  Related Products
Course Title Duration Description
CLISTS Introduction 6 The CLISTS Introduction course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS.
  »  REXX (REstructured eXtended eXecutor language)
Course Title Duration Description
Introduction to the REXX Programming Language
4 The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program.
REXX Keyword Instructions
6 The REXX Keyword Instructions course discusses the common keyword instructions used in REXX coding and describes how looping and execution control instructions are invoked.
REXX Built-In Functions
6 The REXX Built-In Functions course describes the standard built-in functions that are available with REXX.
REXX with z/OS and TSO/E
6 The REXX with z/OS and TSO/E course explains how REXX is used in TSO and z/OS environments.
  »  SDSF 2.4 (System Display & Search Facility)
Course Title Duration Description
SDSF Concepts and Operation
8 The SDSF - Concepts and Operation course describes the purpose of SDSF, providing details on how it is accessed and how you interact with it. The course then explains how data is located and the use of filtering commands to display specific information. Details of SDSF initialization and shutdown are provided with solutions to common problems. Finally, a description of SDSF logs and how they are used is covered.
Using SDSF to Control Job Processing
7 The SDSF - Using SDSF to Control Job Processing course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands. Control of overall batch job activity through the use of MAS, Scheduling Environments and Initiators is also discussed.
Using SDSF to Display, Manipulate and Print Job Output
6 The SDSF - Using SDSF to Display, Manipulate and Print Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether. Details associated with displaying and modifying printer attributes and activity are also covered.
Using SDSF to Manage System Resources and Devices
6 The Using SDSF to Manage System Resources and Devices course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages. Details associated with displaying and managing spool, and JES2 node and line activity are also explained.
SDSF – Advanced - Tips and Tricks
2 This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4.
  »  Security (RACF & CA ACF2)
Course Title Duration Description
Introduction to Mainframe Security Series 2.3
Introduction to Mainframe Security v2.3
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
RACF v2 Series
RACF Introduction
3 This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.
RACF - Defining and Managing Users
4 The “RACF - Defining and Managing Users” course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several interfaces.
RACF - Managing RACF Groups and Administrative Authorities
3 The “RACF - Managing RACF Groups and Administrative Authorities” course follows on from the “RACF -Defining and Managing Users” course describing how users can be connected to group profiles and can be assigned special privileged access.
RACF for System Programmers
3 The “RACF for System Programmers” course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.
Protecting Data Sets Using RACF
3 The “RACF - Protecting Data Sets Using RACF” course describes how RACF is used to define access to z/OS data sets. Information on the profiles used to provide this access is also discussed in detail.
RACF - Protecting General Resources Using RACF
4 The “RACF - Protecting General Resources Using RACF” course describes how RACF is used to define access to system resources such as DASD and tape volumes, load modules (programs), and terminals. Details of the profiles used to provide access to these items is also discussed in detail.
RACF - RACF and z/OS UNIX
3 The “RACF - RACF and z/OS UNIX” course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
Managing Digital Certificates
3 The “Managing Digital Certificates” course discusses how digital certificates are used to provide authentication in a z/OS environment, with initial content describing how to plan for their use. Details discussing how digital certificates are created and managed are then provided.
RACF for Auditors
4 The RACF for System Auditors course describes the purpose of an audit and provides an overview of steps used when planning one. Following this, more in-depth RACF audit commands and controls are discussed along with the types of reports that can be produced.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
  »  Service Oriented Architecture
Course Title Duration Description
Service Oriented Architecture 4 This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption.
  »  TSO/ISPF 2.4 (Time Sharing Option & Interactive Systems Productivity Facility)
Course Title Duration
(hours)
Description
ISPF (z/OS) - Using Online System Facilities - TSO/ISPF
5 The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured.
ISPF (z/OS) - Managing Data Files and Definitions with ISPF/PDF
5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects.
ISPF (z/OS) - Maintaining Data in Files with the ISPF Editor
7 The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse, and edit data within a data set.
TSO/ISPF – Advanced - Tips & Tricks
2.5 This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4.
  »  Utilities 2.4
Course Title Duration Description
z/OS Batch Utilities Series
General Data Set Utilities
4 This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Data Utilities
5 This course looks at the IEBGENER, ICEGENER, IEBCOMPR, IEHLIST and DFSORT utilities and provides real-life examples describing how they are used to interrogate and modify data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Advanced - Tips and Tricks
1.5 This course contains many Utility-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4.
VSAM Series
Introduction to VSAM
6 This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors.
  »  Virtualization (z/VM)
Course Title Duration Description
Version 7.1
z/VM Concepts, System Initialization and Shutdown
6 The z/VM Concepts, System Initialization and Shutdown course describes how virtualization, and in particular z/VM, has become more popular in Data Centers and examines the processes used for z/VM start-up and shutdown.
Monitoring and Controlling z/VM Operations
5 The Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources.
Managing Guest Operating Systems
6 The Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM and the methods used to create, display and manipulate CMS files.
Identifying and Resolving z/VM Problems
5 The Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also described.
Linux on z Systems Fundamentals
5 The Linux on z Systems Fundamentals course discusses common Linux distributions for the z systems environment, how Linux is accessed, its operational implementation, and the general monitoring and management of Linux. The Administrator module provides an overview of the tuning, monitoring, and analyzing tasks performed by the Linux Administrator and contains tips for best practice in these areas.
  »  z/OS 2.4
Course Title Duration
(hours)
Description
z/OS Concepts and Components
7 The z/OS Concepts and Components course describes the evolution of mainframe computing and provides descriptions of the major components that comprise today's z/OS environment. Details of general z/OS processing concepts are also provided.
Initializing and Terminating the z/OS System
4 The Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system startup and shutdown, describing the most common commands and operator responses.
Monitoring the z/OS System
5 This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices. An overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS are also provided as well as a description on how SMF data is created and controlled. This course also discusses the need for message suppression and describes how this is achieved.
Identifying z/OS System Problems
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.
Resolving z/OS System Problems
5 The Resolving z/OS System Problems course describes the processes and commands required to resolve common z/OS system problems. It also describes when cancel and force commands should be used and how to handle command flooding.
z/Architecture - Processing Workloads
5 The z/OS Architecture - Processing Workloads course describes how today's z/OS system processes workloads, focusing on the concepts of address spaces showing how they provide the environment under which tasks can run. You will look at the different types of CPUs that can be configured in a z/OS system and see how programs issue instructions to the CPU. Diving down deeper you will then look at the CPU chips themselves and view the components that comprise them, looking at their involvement in processing work. Finally, the major components that comprise the mainframe's I/O structure are presented to show how work moves throughout the z/OS environment.
z/Architecture - Memory, Address Spaces, and Virtual Storage
3 Processor storage, real storage, or central storage. Whatever you call it, it is the memory where z/OS programs and their data need to reside before they can be processed, and like other mainframe resources it can be virtualized. In this z/OS Architecture - Memory, Address Spaces and Virtual Storage course, you will see how the address spaces discussed in the previous course, access and free the memory they require to process work. You will also see how virtualization of this resource occurs, which for IT specialists will provide them with knowledge to troubleshoot memory-related issues.
z/OS – Advanced - Tips & Tricks
2 This course contains many z/OS-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4.
z/OS Console Simulators Series
z/OS MVS Command Simulations
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS System Shutdown and IPL Simulations
.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shutdown and start-up of a z/OS system.
SMP/E - Introduction to SMP/E
3 Ensuring that all of your organization's z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software.
  »  z/OS Connect
Course Title Duration Description
z/OS Connect EE - IBM z/OS Connect Enterprise Edition v3
3 The z/OS Connect EE - IBM z/OS Connect Enterprise Edition course discusses the need for organizations to open up their mainframe data to cloud, mobile and web customers and describes how z/OS Connect EE provides this capability. The course also covers what IT specialists need to know on how resource access and data communication is performed by z/OS Connect EE.
  »  z/OS Management Facility
Course Title Duration Description
z/OSMF - The IBM z/OS Management Facility 6 This course provides the learner with a basic understanding of the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it. The course then delves further, providing the student with the skills needed to use all the z/OSMF features: problem management, configuration of WLM and TCP/IP, software management and deployment, capacity provisioning, performance monitoring, and workflow creation.
  »  z/OS UNIX System Services 2.4
Course Title Duration Description
z/OS UNIX - z/OS UNIX System Services Basics
3 This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used.
z/OS UNIX - Interacting with the z/OS UNIX System
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
z/OS UNIX - Working with z/OS UNIX
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
  »  Zowe Curriculum
Course Title Duration
(hours)
Description
Zowe Basics
2 The Zowe Basics course discusses the components that comprise Zowe and the benefits of using Zowe and how its capabilities can be extended


Search our catalog