Broadcom - Interskill Learning Mainframe Training

[email protected]

The Online Mainframe Training Specialists
Search   Course Catalog  

Mainframe eLearning Library Catalog

Below is a complete list of all self-paced elearning courses grouped by curriculum. We recommend you follow a job-role specific Learning Plan but courses can be taken at any time, in any order and unlimited times within your contract period. Courses and assessments are accessed by students online 24/7 via our Learning Management System(LMS). Please contact your Broadcom Representative with any questions.


  »  Artificial Intelligence and Data Analytics
Course Title Duration Description
Artificial Intelligence and Data Analytics 3.1 Series
AI Artificial Intelligence and Modern Business
4 The Artificial Intelligence and Modern Business course is an introductory course that begins by explaining general concepts around Artificial Intelligence (AI). The second module explains AI's advantages and disadvantages along with considerations around ethics, security and regulation. The last module focuses on AI's place on the mainframe covering topics around how AI can be used to assist in modernizing applications, help solve business problems using AI modelling, its use in various mainframe products such as Db2, and improve workload management.
AI - Big Data and Hadoop
3 This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organizations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data. The Hadoop Fundamentals module explains how the Apache Hadoop environment is designed to store and process big data, and introduces Apache products such as MapReduce, YARN, Apache Spark and Tez.
AI - Data Analytics and Apache Spark
3 This Basic Analytics module provides an overview of different types of analytics and describes how organizations can benefit from using them. The second module describes the IBM Z Platform for Apache Spark (z/OS Spark) used for z/OS data analytics.
  »  Assembler
Course Title Duration
(Hours)
Description
HLASM Assembler Language Series
Assembler Introduction
5 The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability.
Assembler Instructions
7 The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed.
Assembler Macros
5 The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use.
Assembler Programming
8 The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings.
Assembler z/OS Advanced
5 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
Assembler Cross Memory Services
4 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
  »  Blockchain
Course Title Duration Description
Blockchain Series
Blockchain Technologies
4 The Blockchain Technologies course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network.
  »  C Programming
Course Title Duration
(Hours)
Description
C Programming Series
C/C++ on z/OS for C Programmers 1 This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment.
  »  CA Curriculum
Course Title Duration
(Hours)
Description
CA 1 Series
CA 1® Tape Management - Using Tape Media 5 The CA 1® Tape Management - Using Tape Media course describes the use of the CA 1® Tape Management system, the online facility and its uses, and the standard daily maintenance processing required by CA 1.
CA 1® Tape Management - Identifying and Resolving Media Problems 5 The CA 1® Tape Management - Identifying and Resolving Media Problems course describes the structure of the CA 1 Tape Management system, its chaining process, AIVS and tape stacking facilities, problem determination, and the utilities available for correcting structural problems and reporting.
CA OPS/MVS Series
CA OPS/MVS – Event Management and Automation - Overview, Components and Features 5 The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided.
CA OPS/MVS – Event Management and Automation - Rules and OPS/REXX 5 The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided.
CA OPS/MVS – Event Management and Automation - Automating Events Using the Relational Data Framework 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation.
CA OPS/MVS – Event Management and Automation - Automating Events Using the System State Manager (SSM) 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed.
CA OPS/MVS –Event Management and Automation - Schedule and Group Managers for Event Management 4 The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed.
CA 7 Workload Automation Series
Introduction to CA Workload Automation - CA 7® Edition 4 This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions.
CA 7 Workload Automation - Scheduling Batch Processing 6 This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7.
CA 7 Workload Automation - Monitoring and Maintaining the Batch Processing Environment 6 This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes.
CA 7 Workload Automation - System Programmer Interaction with CA 7 4 This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting.
CA 7 Workload Automation - Backup, Recovery and Problem Resolution 5 This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided.
CA 11 Workload Automation Series
CA Workload Automation Restart Option for z/OS Schedulers Overview 4 The Workload Automation Restart Option for z/OS Schedulers Overview course introduces the components, functions, and capabilities of CA 11, and describes how job information is stored and processed by this product.
Managing CA Workload Automation Restart Option for z/OS Schedulers 4 This course looks at the interaction that users have with CA 11 in order to determine the status and attributes of job information stored in the CA 11 database. It also identifies how CA 11 data can be used for generating reports. Common online commands and batch generation programs are discussed in detail, while the last module focuses on possible CA 11 problems and resolution and includes an overview of backup and recovery strategies associated with CA 11.
CA Endevor Change Manager Series
CA Endevor™ Software Change Manager Introduction and Basic Usage 6 The CA Endevor™ Software Change Manager Introduction and Basic Usage course provides an overview of change management practices and describes the role that CA Endevor SCM plays. A general description of CA Endevor SCM configuration defaults is provided along with details of foreground and batch processing tasks that can be performed.
CA Endevor™ Software Change Manager Package Processing and Facilities 5 The CA Endevor™ Software Change Manager Package Processing and Facilities course describes the purpose of packaging and how it is performed in foreground and batch modes. A comparison of functions available using CA Endevor SCM Quick Edit and the CA Endevor SCM ISPF Interface is discussed. The Query facility is also described, along with how to use the Automated Configuration Management data.
  »  CA Premium Curriculum
CA ACF2™
Course Title Duration
(Hours)
Course ID Description
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - PDS Member Level Protection .75 06ACF30340 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - Basic GSO Options 1.25 06ACF30230 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations. This course contains the same information as the Instructor-Led Training (06ACF30221).
CA ACF2 for z/OS Version 16.x: Intermediate Administration 300 - Apply Privilege Control 4 06ACF30240 The topic of this WBT is Apply Privilege Control which will show students how to extend and apply limits to CA ACF2 privileges in a dynamic and granular fashion, provide a stronger implementation to meet corporate security goals, and defining special privileges and controls.
CA ACF2 for z/OS Version 16.x: Leverage Profile Records .75 06ACF30250 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations.
CA ACF2 for z/OS Version 16.x: Apply Cross Reference Records 1 06ACF30260 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations
OnDemand CA ACF2 for z/OS Version 16.x: Intermediate 300 - Digital Certificates 1.75 06ACF30270 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Intermediate Administration 300 - Apply Digital Certificates 1 06ACF30280 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Secure FTP 1.25 06ACF30290 This course introduces additional features of CA ACF2 that provide default protection for your mainframe operating systems. During the course, the material covered will be reinforced through case studies and demonstrations.
CA ACF2 for z/OS Version 16.x: Secure USS 300 1 06ACF30300 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Intermediate 300 - Secure MQ 1.25 06ACF30310 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 for z/OS Version 16.x: Intermediate 300 - Secure CICS 1.75 06ACF30320 This course focuses on the features of CA ACF2 that provide default protection for your mainframe operating systems. The material covered in this course will be reinforced through case studies and interactive demonstrations.
CA ACF2 r1.3 Option for DB2 200 4 06ACF20080 This course will introduce you to the features of CA ACF2 Security Option for DB2, which provides default protection for users who connect to DB2 and use DB2 objects and resources. The class will identify and discuss DB2 and native DB2 security, along with how CA ACF2 Security Option for DB2 replaces and enhances DB2 security. Case studies and class workshops will prepare you to write and implement rules for numerous DB2 data objects and resources for new or existing DB2 subsystems. Furthermore, the class will provide valuable information so that you can identify and use specific CA ACF2 Security Option for DB2 security options, special utilities and reports. You will return to your job ready to customize your installation of CA ACF2 Security Option for DB2.
CA ACF2 for z/OS Version 16.x: Foundations 200 - Describe Mainframe .25 06ACF20100 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
ACF2™ for z/OS: Foundations 200 - Features and Capabilities .25 06ACF20180 This course will show you how ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Logonid Concepts .75 06ACF20120 This course is broken into multiple parts. Each part can be taken individually, or as part of the complete course. If all modules are taken, it is recommended that they be taken in the order listed on page 2 of this course description. This course contains the same information as the Instructor-Led Training (06ACF20091)
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Work with Logonids 1.5 06ACF20130 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Secure Data 1.25 06ACF20140 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Resource Rules 1.5 06ACF20150 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
OnDemand CA ACF2 for z/OS Version 16.x: Foundations 200 – Secure Resources 1 06ACF20160 This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
ACF2™: Foundations 200 - Mainframe Cybersecurity & Compliance Overview .25 06ACF20170 This course shows you how to describe basic IT security goals and concepts, identify innate MVS security features and potential MVS attack vectors, understand how general IT security goals and procedures apply to the mainframe will help to increase security administration productivity.

CA Brightside
Course Title Duration
(Hours)
Course ID Description
Mainframe Fundamentals 100 1 06MFO12030 This course will focus on an introduction to the Mainframe, the key differences between a Mainframe and distributed platforms, and the key components of specialty engines used in a Mainframe. You will also be introduced to the challenges that businesses face, how Mainframe is evolving as part of digital transformation efforts to help address these challenges, and introduce the new Mainframer to some of the most common terms used in this corner of the industry.
CA Brightside Installation Overview 100 .5 06BRS10020 This course will introduce you to CA Brightside and it’s main components.
CA Brightside Support Offering 100 .5 06BRS10030 This course will introduce you to CA Brightside and it’s main components.
CA Brightside: Getting Started with the Zowe API Mediation Layer 200 .75 06BRS20080 This course will focus on the Zowe API Mediation Layer component of the CA Brightside support offering.

CA Cleanup
Course Title Duration
(Hours)
Course ID Description
CA Cleanup: Introduction .25 06CLN10010 This course provides a brief introduction of CA Cleanup as one of several Web Based Training courses that contain the same information as the CA Cleanup Instructor Led Training.
CA Cleanup for z/OS: Product Components .25 06CLN20010 This course provides details of CA Cleanup’s basic components and how CA Cleanup works. This course is one of several Web Based Training courses that contain the same information as the CA Cleanup Instructor Led Training.
CA Cleanup for z/OS: Best Practices 200 .25 06CLN20020 This Course Will Show You How To: Describe best practices related to CA Cleanup, Describe additional functionality when running reports.
CA Cleanup for z/OS: Using CA Cleanup for ACF2 200 .5 06CLN20030 This course shows how to use CA Cleanup for ACF2. This course is one of several Web-Based Training courses that contain the same information as the CA Cleanup Instructor-Led Training.
CA Cleanup for z/OS: Using Cleanup for Top Secret 200 .3 06CLN20040 This Course Will Show You How To: Customize the Cleanup jobs for your site Run and analyze reports Describe the command and backout file syntax Use include and exclude statements and advanced features Perform a security file cleanup in full or phased

CA 1 Tape Management
Course Title Duration
(Hours)
Course ID Description
CA 1 Tape Management: Tape Processing .5 06TPM20110 In this course, you will learn about tape data sets and tape labels and how these tape characteristics relate to CA 1 tape management.
CA 1 Tape Management: Tape Processing with CA 1 .75 06TPM20120 In this course, you will learn how and when CA 1 gains control and when the TMC is updated. It will also explain the use of EXPDT and REPDT in your JCL to obtain the desired expiration date for a tape.
CA 1 Tape Management: Initialization and Operation .5 06TPM20130 In this course, you will learn how to start CA 1, the messages that are produced, and some of the system abends that may occur.
CA 1 Tape Management: Online Inquiry and Update 200 1 06TPM20160 This Course Will Show You How To: Use the powerful facilities that are available with the ISPF interface. Perform inquiry on volume, data set, and control record information. Perform utilities affecting tape volume status. Explain and interpret volume record flag settings.
CA 1 Tape Management: Daily Maintenance 200 1 06TPM20170 In this course, you will learn about the daily jobs that should be run to ensure CA 1 retains your tapes correctly. You will also learn how to backup and restore the TMC.
CA 1 Tape Management: System Options 1 200 1.5 06TPM20140 This is course 1 of 2 covering CA 1 system options. In this course, you will learn where the CA 1 options come from and how to specify which member should be read to obtain them. You will also learn how to determine what your current active options are set too versus what is currently in the options PDS member. Finally, you will review all the basic and the EDM (External Data Manager) options set within CA 1 and what each option is for.
CA 1 Tape Management: System Options 2 200 1 06TPM20150 This is course 2 of 2 covering CA 1 system options. In this course, you will learn about the S cratch Pool Management feature. You will also learn about additional members that are used during TMSINIT processing to control how CA 1 is defined.
CA 1 Tape Management: Reporting 200 .75 06TPM20180 In this course, you will learn about the reports supplied by CA 1 and the basics for writing customized reports using TMSGRW.

CA Gen
Course Title Duration
(Hours)
Course ID Description
CA Gen release 8.x: Foundations 100 .25 06GEN10160 In this course, you will learn how to describe the high level concepts of the CA Gen development lifecycle. You will also learn about the activities that take place in each phase, and the importance of keeping the phases separate.
CA Gen Encyclopedia - Concepts and Functions 1 06GEN10180 This course provides a series of recordings regarding getting started with consuming RESTful APIs in both Gen's CICS and Java applications.
Gen™: Getting Started with Password Phrase with Client Manager 100 .75 06GEN10190 This course provides a series of recordings regarding getting started with password phrases with Client Manager.
Gen™: Migrating to the Gen CSE on Linux 100 .5 06GEN10200 Get guidance on moving to Gen's recently released Client Server Encyclopedia CSE) on Linux. This course will cover the steps needed, along with insights, for your migration to this new offering. This is especially important for Gen customers on HP UX since HP UX is nearing end of life.
Gen™: Continuous Adoption 100 .5 06GEN10220 Learn how to keep your Gen installations up to date . We’ll discuss what to expect from Broadcom’s Continuous Delivery model and how Gen  follows these best practices when delivering enhancements, defect fixes, and security maintenance. 
Gen: RESTful APIs for Your Gen Applications 100 .5 06GEN10230 This Course Will Show You How To: Identify the possibilities with RESTful APIs. Identify potential barriers. Get started using RESTful APIs with Gen.
CA Gen Encyclopedia - Concepts and Functions 1.5 06GEN20340 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Manage Models .5 06GEN20350 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Transfer Data 1.5 06GEN20360 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen Encyclopedia - Control Access .5 06GEN20370 In this course, you will discover how encyclopedias provide a central repository of objects and allow large teams of developers to work on multiple development projects at the same time.
CA Gen: Design and Construction for GUI and Web - Design the Database .5 06GEN20380 This Course Will Show You How To: Design a database in CA Gen. This will enable you to transform data models that you have developed for your own business applications.
CA Gen: Design and Construction for GUI and Web - Generate and Install the Database .5 06GEN20390 This Course Will Show You How To: Generate and install a database.
Using REST APIs to Open Gen Applications to the Enterprise 200 .5 06GEN20460 This course provides use cases with demos of publishing and consuming RESTful APIs to expose Gen functionality and integrate with your enterprise system.
Gen: Introduction to APIs 100 .17 06GEN10240 This course will introduce the concept of the API and REST within the Gen environment.
Gen: Add Call REST Statements 200 .5 06GEN20600 This course will show you how to add the CALL REST statement to the Gen action block and match the API data for import and export.
Gen: PTF Installation and Uninstallation 200 .25 06GEN20610 This course will show you how to install as well as uninstall PTFs to ensure you are running the correct version of Gen.


CA InterTest
OnDemand CA InterTest Batch V10: Testing and Debugging 200 2.5 06ITB20150 This course is designed for programmers who test, debug, and fine-tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to detect and resolve errors interactively as they occur to help effectively minimize your application downtime and improve overall application quality.
CA InterTest for CICS: Interactive Debugging and Breakpoints 200 .5 06ITT20010 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will enable you to use CA InterTest for CICS to help debug programs and work with breakpoints.
CA InterTest for CICS: Test Prerequisites (Setup) 200 .5 06ITT20020 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will show you basic navigation and the core testing functionalities included in CA InterTest for CICS, including use of symbolics, monitoring, breakpoints, and Keep window options.
CA InterTest for CICS: Breakpoint activities (Debugging) 200 .75 06ITT20030 This Course Will Show You How To: Resume execution from a breakpoint, Apply single-stepping, auto-stepping, and step timing, Abend a task, Apply the Backtrace feature, Apply the Code Coverage feature, Apply indirect commands, Display breakpoints for a program, New Copy a recompiled program and reset breakpoints, Modify program data item values, Access interactive help
CA InterTest for CICS: Advanced Debugging Features 200 .75 06ITT20040 This course is designed for programmers who test, debug, and fine-tune IBM CICS Transaction Server applications written in COBOL, Programming Language One (PL/I), Assembler, and Language Environment. It will show you how to apply various commands and features used to debug programs.
CA InterTest for CICS: Other Facilities 200 .25 06ITT20050 This Course Will Show You How To: Test DB2 and SQL/DS programs, Maintain help entries for user abend codes, Access CA SymDump for CICS, Describe CA InterTest Batch
CA InterTest Batch: Introduction 200 .5 06ITT20060 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to articulate the core concepts of CA InterTest Batch.
CA InterTest Batch: Basic Test using Batch Link 200 .75 06ITT20070 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to start a basic test using Batch Link and issue basic commands.
CA InterTest Batch: Batch: Common Commands 200 .75 06ITT20080 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to identify and use common commands.
CA InterTest Batch: Batch: Optional Files 200 .25 06ITT20090 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to use optional files. You can create optional files to assist in creating and maintaining your debugging environment. Optional files enable you to perform tasks such as creating reports, which you can view after your debugging session has ended.
CA InterTest Batch: Batch: Symbolic Support 200 .5 06ITT20100 This course is designed for programmers who test, debug, and fine une COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable understand and implement symbolic support, its components, and the PROTSM member.
CA InterTest Batch: Batch: DB2 SP and IMS/DC 200 .75 06ITT20110 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to debug DB2 SPs and IMS/DC applications, understand the scheduling feature, its benefits and options, special factors to consider for DB2 SP and IMS/DC debugging, and how the algorithm for schedule precedence works.
CA InterTest Batch: Advanced Debugging 200 1.25 06ITT20120 This course is designed for programmers who test, debug, and fine-tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. This course will focus on advanced debugging sessions using a series of product simulations.
CA InterTest Batch: Foreground Debugging 200 .5 06ITT20130 This Course Will Show You How To: Describe the functions of Foreground Debugging. Explain JCL requirements. Navigate the Foreground Debugging Link menu and selection panels.
CA InterTest Batch: JCL Conversion for Foreground Debugging 200 .75 06ITT20140 This course is designed for programmers who test, debug, and fine tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) applications and DB2 stored procedures. It will enable you to execute JCL conversion and allocation which is required for Foreground Debugging. The conversion of JCL to ALIB format is useful if you have existing JCL that you want to use for your allocations.
CA Librarian
CA Librarian: Overview 100 .25 06LIB10010 This course provides an overview of CA Librarian.

CA Database Management for DB2® for z/OS®
Course Title Duration
(Hours)
Course ID Description
Db2 DevOps: Using the DBM for Db2 Plug-in for Zowe CLI .25 06DBD20010 This Course Will Show You How To: Generate DDL for a single Db2 object or multiple Db2 objects. Verify the generated DDL syntax. Compare DDL to a target subsystem and make changes. Migrate and deploy Db2 object changes from one subsystem to another. Revert the DDL changes.
Using Db2 DevOps API Requests 200 .4 06DBD20020 This course will show you how to: Explain how REST APIs work. Identify the different parts of an API request. Describe how you can use the DBM Data Service API to expose Database Management Solutions for Db2 for z/OS product services and metrics. Understand how to use different DevOps API requests. Use the DBM for Db2 Plug-in for ZoweCLI to exploit the DBM Data Service endpoints for Db2 schema provisioning and deployment.
CA Plan Analyzer for DB2 r16: Core Functions 200 1.5 06DBT20420 CA Plan Analyzer is a database performance management product that provides efficient and easy-to-understand DB2 plan analysis. It can be used to analyze a single SQL statement or an entire application. This course is designed to show you how to analyze SQL from multiple sources. You will learn how to set up EXPLAIN processes, compare historical versions of access paths, and generate detailed access path analysis reports.
CA Database Analyzer for DB2 r16: Core Functions 200 2.5 06DBT20450 This course demonstrates how to automate DB2 administrative tasks and how to create reports and queries using CA Database Analyzer.
Fast Load & Fast Unload Version 18 for Db2 for z/OS: Core Functions 200 2 06DBT20660 CA Fast Load and CA Fast Unload are high-speed utilities designed to load and unload large amounts of data with little or no impact on system performance. CA Fast Load and CA Fast Unload provide extensive formatting and data conversion options to make the data available for immediate use by other applications. This course will enable you to load and unload data within DB2 using CA Fast Load and CA Fast Unload. In addition, you will learn to leverage other CA tools and functions while loading and unloading data.
Requirements for Using Mainframe Team Center - Database Management for Db2 for z/OS: Foundations 200 .25 06DBT20530 This course will familiarize you with the architecture and the requirements for using Mainframe Team Center - Database Management for Db2 for z/OS.
CA Log Analyzer V18 for DB2 for z/OS: Core Functions 200 2 06DBT20580 This course will show you how to monitor log activity and rollbacks requested by programs. In addition, you will see how to audit DB2 system activity and generate log content information.
OnDemand CA Fast Recover and CA Recovery Analyzer V18 for DB2: Core Functions 200 1.5 06DBT20590 This course provides an introduction to the core functions of CA Fast Recover and CA Recovery Analyzer. You will discover how to configure the products, perform key tasks such as recovering data at various levels, and creating/analyzing recovery strategies. The learning experience is enhanced by hands-on self-paced lab exercises that will give you an opportunity to perform the tasks yourself.
OnDemand CA Quick Copy and CA Merge/Modify V18 for DB2 for z/OS: Core Functions 200 2 06DBT20600 This course is designed to help you understand and utilize the core functions of CA Quick Copy and CA Merge/Modify. You will learn how to reduce the time and effort spent on routine tasks, how to accelerate the recovery process, how to create up-to-date copies, without adversely impacting online availability of the tables, and how to implement the recovery procedures that work best for your business.
OnDemand CA RC/Migrator and RC/Compare V18 for DB2 for z/OS: Core Functions 200 1.5 06DBT20610 This course is designed to help you understand and utilize the core functions of CA Merge/Modify and CA Quick Copy.
Requirements for Using Mainframe Team Center - Database Management for Db2 for z/OS: Foundations 200 .25 06DBT20620 This Course Will Show You How To: Locate the configuration worksheet and locate detailed information about the steps and skill sets required to address the prerequisites. Address the Xnetand Database Management Data Service security requirements. Configure Mainframe Team Center -Database Management for Db2 for z/OS.
On Demand CA Report Facility for TSO: Creating Queries 200 .25 06DBT20770 This course will show learners how to create queries, both temporary and permanent, from your DB2 database. Learners will see how to work with single and multiple table queries, filter data to be retrieved, and define expressions.
On Demand CA Report Facility for TSO: Creating Forms 200 .25 06DBT20780 This course will show learners how to take their existing queries and display them in three format/views. Learners will then be able to format they raw query data in the optimum format for the intended audience.
On Demand CA Report Facility for TSO: Creating Procedures 200 .25 06DBT20790 This course will show learners how to take their existing queries and forms and automate the reporting function. Learners will then be able to execute a procedure that will run saved queries and the corresponding saved forms, either on demand or via a batch run.
Subsystem Analyzer for Db2 for z/OS: Overview 200 .5 06PSA20010 This Course Will Show You How To: Navigate Subsystem Analyzer collection real time or historical activity, identifying the most frequently accessed objects and how they are being accessed. Identify the SQL responsible for table or index getpageactivity. View Db2 subsystem statistics to determine if they have an impact on application performance for the collection interval. Manage Subsystem Analyzer getpagesampling. Understand the benefits of integrating Subsystem Analyzer with Detector

CA Datacom
Course Title Duration
(Hours)
Course ID Description
Datacom DB: DBUTLTY User Database Management Routine Functions 200 1.5 06DCM20060 This course covers the DBUTLTY commands and functions used to routinely manage and maintain application database structural components
Datacom™/DB: DBUTLTY User Database Management - Special Use Functions 200 .5 06DCM20070 This course covers the DBUTLTY commands and functions used to routinely manage and maintain application database structural components
Datacom™/DB: Datadictionary Key Concepts 200 .75 06DCM20100 This Course Will Show You How To: Describe the relationship between the Datadictionary and the Datacom/DB. Multi User Facility (MUF). Identify the structural components of a database. Describe Datadictionary content management using version and status. Name the methods for defining a database. Identify the Datacom Products and Facilities that use the Datadictionary.
CA Datacom/DB: Database Key Concepts 1.5 06DCM20130 This course addresses key database concepts of CA Datacom.
CA Datacom®/DB: Defining the Multi-User Facility 200 1 06DCM20190 This course introduces you to key CA Datacom/DB Multi-User (MUF) concepts, features, and facilities.
CA Datacom/DB: Managing the Multi User Facility 200 1 06DCM20200 This course covers how to configure, monitor, and manage key resources in order to keep CA Datacom/DB Multi-User Facility (MUF) running as effectively and efficiently as possible.
Datacom DB: Data Dictionary Online Entity Display 200 .5 06DCM20240 This course introduces you to the Entity Display (ENTDISPL) function of Datadictionary Online (DDOL).
Datacom™/DB: Datadictionary Online - Entity Maintenance .5 06DCM20250 This course introduces you to the Entity Maintenance ENTMAINT) function of Datadictionary Online (DDOL).
Datacom™/DB: Datadictionary Online - Database Maintenance 200 .5 06DCM20260 This Course Will Show You How To: Describe how and when to use the Database Maintenance (DBMAINT) mode. Describe how the Selection Criteria Fill in panel is used. Use margin commands to create a database structure and perform database maintenance functions.
Datacom™/DB: Datadictionary Batch Utilities Overview 200 .75 06DCM20270 This course shows you how to use each Datadictionary batch utilities functions and identify the utilities used to maintain and manage Datacom database structures.
Datacom DB Datadictionary Batch Record Migration Facility .5 06DCM20280 This course shows you how to describe the Datadictionary DDRMFLM utility function and know how to use it to reformat user database table data.
Datadictionary DDUPDATE Batch .5 06DCM20290 This course shows you how to use the DDUPDATE utility purpose and function, and use it to process DDBTGLM utility generated transactions.
CA Datacom/DB: Defining DBUTLTY 200 1.5 06DCM20010 This Course Will Show You How To: Describe what DBUTLTY is Describe DBUTLTY command format and functions Describe DBUTLTY command error options Describe the impacts of the SIMPLIFY feature and external security Describe DBUTLTY execution results and output content Describe DBUTLTY/MUF interaction and resource ownership
CA Datacom® System Performance REST API 200 .33 06DCM20030 This video will show you what a RESTful API is and a use case to expose CA Datacom performance metrics using the CA Datacom RESTful API.
CA Datacom /DB: DBUTLTY System Area Management 200 1 06DCM20040 This Course Will Show You How To: • Identify CA Datacom/DB System Areas • Describe the purpose of each System Area • Describe the DBUTLTY commands used to manage and maintain the System Areas • Identify CA Datacom/DB System Databases • Describe the purpose of each System Database • Describe the DBUTLTY commands used to manage and maintain the System Databases
CA Datacom /DB: DBUTLTY Report Area=CXX 200 1 06DCM20050 This Course Will Show You How To: Identify the DBUTLTY Directory (CXX) report types. Describe the information contained in each of the CXX report types. Describe the primary purpose of each CXX report type. Describe the layout of the information in each CXX report type. Describe the content contained in each CXX report type. Identify the DBUTLTY keyword parameter values that are contained in the CXX report types.
Datacom™/DB: Datadictionary Online - Menus and Commands .5 06DCM20210 This course introduces you to the menus and commands in the online Datacom Datadictionary facility.
Datacom™/DB: Datadictionary Online - Administration .25 06DCM20220 This Course Will Show You How To: Describe the Datadictionary Administration function. Describe the available Datadictionary user profiles. Display, add, or update Datadictionary User IDs and passwords.
Datacom™: Installing SQL Performance Analyzer .25 06DCM20140 Datacom™ SQL Performance Analyzer is a graphical user interface to the Datacom™ SQL Source Cache, which is a collection of previously executed dynamic queries. The tool allows the database administrators (DBAs) and developers to identify inefficient queries, generate optimization reports, tune the queries, monitor the current activity, and cancel a poorly performing query. This video provides instructions on installing and configuring Datacom™ SQL Performance Analyzer.
Datacom™: Using SQL Performance Analyzer .25 06DCM20150 Datacom™ SQL Performance Analyzer is the perfect place to start in order to view the current activity and the cached queries in your datacom environment. With an easy-to-use graphical interface, you can monitor the current transactions and cancel any problematic transactions. You can find the cause of a slow query, isolate the root cause and perform query tuning. It also allows you to generate Optimization reports and set limits for the query execution.
New Datacom Dataclass Report 200 .07 06DCM20230 Video explaining New Datacom Dataclass Report 200
Using the Datacom Health Check Analyzer 200 .25 06DCM20300 Video explaining Using the Datacom Health Check Analyzer 200
Installing and Configuring the Datacom Health Check Analyzer 200 .27 06DCM20310 Video explaining Installing and Configuring the Datacom Health Check Analyzer 200

CA Deliver
Course Title Duration
(Hours)
Course ID Description
CA View™ and CA Deliver™: Product Admin Overview 100 .25 06DLV10010 This course consists of a 15-minute recorded presentation designed to provide a high-level overview of CA View and CA Deliver.
CA Deliver™ Using Distribution Tables to Enhance Dynamic Report Distribution 200 .5 06DLV20010 This Course Will Show You How To: •Explain how to use distribution tables to determine where a report is distributed. •Explain how to use distribution tables to determine which report pages to distribute.
Transitioning Report Distribution From CA Bundl ® to CA Deliver™ 200 .25 06DLV20020 This Course Will Show You How To: • Explain how CA Bundl functionality such as the Standard Translation File(STF) table and the Standard Rule File (SRF) table correspond to distribution tables in CA Deliver. • Describe how the variables and operators used in CA Bundl correspond to the use of variables and operators in CA Deliver.
CA Deliver: Introduction to the Admin Menu 200 .25 06DLV20030 This Course Will Show You How To: Describe the tasks you can complete from the Admin Menu. Identify the commands and operands you can issue from the Admin Menu. Generate and filter lists of reports, jobs, and report distribution, based on your security permissions.
CA Deliver: Understanding Distribution IDs (DISTIDs) 200 .1 06DLV20040 This Course Will Show You How To: Describe the purpose of distribution IDs (DISTIDs). Create a DISTID and assign it to a report. View a list of existing DISTIDs. Cross-reference a selected DISTID to see a list of reports that correspond to it.
View™: How User Modes and Selection Criteria Impact SYSOUT 200 .25 06DLV20050 This Course Will Show You How To: Describe each user mode and the output each mode supports. Change user modes (if authorized) and understand how your role relates to each user mode. Describe the output location codes. Generate a SYSOUT selection list and use selection codes. Apply column filters to a SYSOUT selection list. Manage the SYSOUT selection list using Selection List Commands.
Deliver: Getting Started for Administrators 200 .5 06DLV20060 This Course Will Show You How To: Explain the different types of data available from the Primary Selection Menu. Navigate the product from the Primary Selection Menu. Use the Active Display to review the reports that were processed today. Create distribution IDs to associate reports with specific departments, processes, users, and so on. View a list of existing distribution IDs. View a list of report definitions. Define a basic report. Use the search and filter features.
Deliver™: Create a Single Report 200 .25 06DLV20140 This Course Will Show You How To: Distinguish between commonly-created report types. Use Deliver to create a single report, also known as a Basic Report. Define a distribution ID that indicates who will receive the report. Define the job that will create the report. Specify the report attributes. Submit the job and review the output.
Deliver™: Create Multiple Reports 200 .25 06DLV20150 This Course Will Show You How To: Determine the report requirements. Define the job that will create the report. Specify the report attributes. Define the report identification text. Submit the job.
Deliver™: Expand Reporting with Distribution Lists and Undefined Reports 200 .20 06DLV20160 This Course Will Show You How To: Use distribution lists to simplify the report definition process. Use the UNDEF report identifier to capture report pages that are not assigned or not accounted for.

DevOps
Course Title Duration
(Hours)
Course ID Description
Getting Started with DevOps: Introduction to DevOps .75 06DEV10010 This course will introduce you to the concepts and implementation of DevOps in a Mainframe environment.
Getting Started with DevOps: Source Code Analysis 200 .75 06DEV20010 This Course Will Show You How To: Define Source Code Analysis Set Up & Configure Source Code Analysis Execute Source Code Analysis
Getting Started with DevOps: CI/CD with Build and Deployment 200 .75 06DEV20020 This Course Will Show You How To: Define CI/CD Define Continuous Integration Define Continuous Testing Define Continuous Delivery/Deployment Identify the benefits of CI/CD Identify a typical CI/CD pipeline on the Mainframe Identify a typical hybrid CI/CD pipeline

Detector
Course Title Duration
(Hours)
Course ID Description
Detector® for DB2 for z/OS: Getting Started 200 .5 06PDT20010 In this course, you'll learn about the types of data that Detector collects, the data collection process, and how to create a collection profile that helps you target the specific data that you want to capture.
Detector® for DB2 for z/OS: Standard Collection 200 .5 06PDT20020 In this course, you'll learn how to view current and historical accounting data values by application, plan name, package/DBRM, and SQL statement perspectives, without using resource-intensive Db2 performance traces.
Detector® for DB2 for z/OS: Exception Collection and Error Collection 200 .5 06PDT20030 Identifying SQL error types and where the errors originate makes it easier to resolve the issue that's causing the error.
Detector® for Db2 for z/OS and Subsystem Analyzer for DB2 for z/OS: Batch Reporting 200 .5 06PDT20040 The content in this course applies to Detector and Subsystem Analyzer

SymDump
Course Title Duration
(Hours)
Course ID Description
On Demand CA SymDump for CICS V10: Resolving Abends 200 2 06SYM20180 This course is designed for programmers who test, debug, and fine-tune COBOL, Programming Language One (PL/I), and Assembler programs, as well as Information Management System/Data Communications (IMS/DC) and DB2 stored procedures. It will help you get the information for a swift, informed response that can increase application reliability and help you consistently meet your SLAs

CA Easytrieve® Report Generator
Course Title Duration
(Hours)
Course ID Description
CA Easytrieve Report Generator r11.6: Basic Reporting 200 1 06ETR20120 This course is also available as part of a bundle (CA Easytrieve Report Generator r11.6: Reports 200 Bundle - 06ETR2011B). The bundle consists of all three CA Easytrieve Report Generator r11.6 courses including, Getting Started, Program Flow and Logic, & Basic Reporting.
CA Easytrieve Report Generator r11.6: Getting Started 200 .5 06ETR20130 This course includes an introduction to CA-Easytrieve Report Generator to people who have little or no data processing or information retrieval experience, but who need to quickly learn CA-Easytrieve Report Generator to retrieve information and generate standard reports.
CA Easytrieve Report Generator r11.6: Program Flow and Logic 200 .5 06ETR20140 The CA-Easytrieve Report Generator: Program Flow and Logic course provides an overview of the program’s activities and logical condition statements.

Endevor
Course Title Duration
(Hours)
Course ID Description
CA Endevor Software Change Manager: Agile and Concurrent Development Configuration .75 06END20150 In this course, you will examine how CA Endevor SCM manages the software change process by effectively planning and configuring your implementation. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and configure CA Endevor SCM as a software change management tool to align with the Agile methodology and/or the recommended concurrent development method.
Endevor: Manage Packages and Approval Processing 200 .75 06END20200 In this course, you will examine how CA Endevor SCM manages the software change process by managing the package and approval process. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
Endevor: Manage Processors  200 1.5 06END20180 In this course, you will examine how CA Endevor SCM manages the software change process by creating and testing Generate, Move and Delete processors. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
Endevor: Overview 100 .5 06END10160 This course will show you how to plan the software lifecycle with CA Endevor SCM, how to use element actions to develop, manage, and control software changes.
Endevor: Introduction 100 1 06END10170 This course will introduce you to planning the software lifecycle with CA Endevor SCM, how to use element actions to develop, manage, and control software changes.
CA Endevor Software Change Manager: Using the Eclipse Plug-In User Interface .75 06END20310 In this course, you will examine how CA Endevor SCM may be accessed via the Eclipse-based GUI interface. By attending this course, you can gain the knowledge and skills needed to utilize the Eclipse-based User Interface (UI) to complete many of your daily CA Endevor SCM tasks.
Endevor: Creating the Inventory Structure 200 .75 06END20160 In this course, you will examine how CA Endevor SCM manages the software change process by defining the inventory structure to be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
CA Endevor Software Change Manager: Create Processor Groups 1.5 06END20170 In this course, you will examine how CA Endevor SCM manages the software change process by creating the processor groups to be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement processor groups for use within CA Endevor.
Endevor: Create and Maintain Processors 200 .25 06END20190 In this course, you will examine how CA Endevor SCM manages the software change process by modifying a processor. By attending this course, you can gain the knowledge and skills needed to help your organization successfully plan and implement CA Endevor SCM as a software change management tool.
Endevor: Perform Package Processing 1.5 06END20210 In this course, you will examine how CA Endevor SCM manages the software change process by creating and casting packages. Additionally, you will learn how to review, execute, and commit packages. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement CA Endevor SCM as a software change management tool.
Endevor: Perform Post-Package Processing Actions 200  .5 06END20220 In this course, you will examine how CA Endevor SCM manages the software change process by exploring utilities used for Package processing and deploying Package outputs. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement CA Endevor SCM as a software change management tool.
CA Endevor Software Change Manager: Describe Additional Administration Functions .75 06END20230 In this course, you will examine how CA Endevor SCM manages the software change process through various administration functions that may be used. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement and maintain CA Endevor SCM as a software change management tool. This Web-based course presents a portion of the same material as the 06END20261 Instructor-led course and is one Web-based course in the CA Endevor® Software Change Manager: Administrators bundle
CA Endevor Software Change Manager: Describe the Eclipse-Based User Interface .5 06END20240 In this course, you will examine how CA Endevor SCM may be accessed via the Eclipse-based GUI interface. By attending this course, you can gain the knowledge and skills needed to help your organization successfully implement and utilize CA Endevor SCM. This Web-based course presents a portion of the same material as the 06END20261 Instructor-led course and is one Web-based course in the CA Endevor® Software Change Manager: Administrators bundle.
Endevor: Performing Common Tasks 200 1.25 06END20280 As an application developer using CA Endevor SCM, the concepts and demonstrations in this course can help you develop the knowledge and skills to effectively perform element actions to develop, manage, and control software changes, which can help to accelerate code movement through the application development lifecycle. This training will also help you develop the knowledge and skills to effectively use CA Endevor SCM to perform development common tasks in the Classic ISPF User Interface, CA Endevor Quick Edit, and the CA Endevor Eclipse Plug-in.
Endevor: Performing Common Tasks 200 .75 06END20450 This Web-based course presents a portion of the same material as the 06END20081 Instructor-led course and is one Web-based course in the Endevor: Administrators bundle.
Endevor Team Build: Introduction to syncz 200 .5 06END20510 This Course Will Show You How To: Define the synczcomponent synczprerequisites and configuration What are the features/benefits of syncz
Endevor Team Build: Introduction to bldz 200 .25 06END20520 This Course Will Show You How To: Define the bldzcomponent bldzprerequisites and configuration What are the features/benefits of bldz What are the key operational units Describe the JavaScript built-in modules Identify the available CLI commands
Endevor Team Build: Introduction to publishz 200 .25 06END20530 This Course Will Show You How To: Articulate the use case for Endevor Team Build -publishz Define the publishzcomponent Articulate the integration with Endevor Bridge for Git
Endevor Team Build: Introduction 200 .5 06END20540 This Course Will Show You How To: Define Endevor Team Build Identify Endevor Team Build’s components What are the features/benefits of Endevor Team Build
Endevor Team Build: Introduction to exportz 200 .25 06END20500 This Course Will Show You How To: Define the exportzcomponent exportzprerequisites and configuration What are the features/benefits of exportz
Endevor Team Build: Introduction to the Standard Library 200 .5 06END20600 In this course, you’ll see how Endevor Team Build offers the Standard Library which is embedded in the bldz function and contains build script librariesfor several common mainframe development languages, thatsignificantly reduce the complexityof creating a build.
Endevor: Web Services 300 1 06END30030 In this course, you will learn what a Web Service is and how it works; more specifically, you will learn how to implement and install the Web Service and validate that it's running.You will also learn how to update the Web Service as needed. This course combines content presentation, audio, and hands-on simulations.
CA Endevor SCM Enterprise Git Bridge Introduction for the Application Developer 1 06GIT10010 This course will show you how to work with the CA Endevor SCM Integrations for Enterprise DevOps CA Enterprise Git Bridge feature that is designed to integrate with CA Technologies flagship SCM . The focus on this course is the developer.
CA Endevor SCM Integrations for Enterprise DevOps: CA Enterprise Git Bridge Feat .5 06GIT10020 This course will show you how to configure, initialize and use the CA Endevor SCM Integrations for Enterprise DevOps CA Enterprise Git Bridge feature that is designed to integrate GitHub with CA Technologies flagship SCM . The focus on this course is the Repository Owner.
Endevor Bridge for Git: Introduction for the Application Developer 100 .5 06END10280 This course will show you how to work with the Endevor Bridge for Git that is designed to integrate with Broadcom’s flagship software change management solution. The focus on this course is the developer.
Endevor Bridge for Git: Introduction for the Administrator 100 .75 06END10270 This Course Will Show You How To: Identify how Endevor Bridge for Git works. Articulate the uses of Endevor Bridge for Git. Complete the configuration and initialization of a synchronized Enterprise. Git Repository (GitHub, GitLab, Bitbucket, Azure DevOps).
Endevor Bridge for Git: Introduction for the Mapping Administrator 100 .5 06END10260 This course will show you how to configure the mappings for the Endevor Bridge for Git feature that is designed to integrate Git applications, such as GitHub, GitLab, Bitbucket, Azure DevOps, etc., with Broadcom’s flagship software change management solution. The focus of this course is the Mapping Administrator.
Endevor Team Build: Introduction to sbomz 100 .25 06END10240 This Course Will Show You How To: Articulate what an SBOM is. Define the Endevor Team Build sbomz. Articulate the use case of the Endevor Team Build sbomz
Endevor: Introduction to Visual Studio Code 100 .5 06END10250 This course will introduce the learner to Visual Studio Code and how to leverage it while working with Endevor.
Endevor: Web Interface for Administrators 200 .5 06END20670 This Course Will Show You How To: Identify the prerequisites for the Web Interface. Explain how to deploy and configure the Web Interface.

File Master
Course Title Duration
(Hours)
Course ID Description
On Demand CA File Master Plus for DB2 for z/OS Release 9.1: User Basics 200 2 06FMS20070 CA File Master Plus for DB2 for z/OS enables you to work interactively with ISPF panels and a graphical Eclipse-based interface, or issue commands in batch. You can easily view and edit tables and views, make quick changes to production or test databases, and populate test databases.
CA File Master Plus for IMS: User Basics 200 1 06FMS20090 This Course Will Show You How To: Access and personalize your CA File Master Plus for IMS environment Browse and edit IMS databases Filter data using selection criteria Use utilities
CA File Master Plus for DB2 for z/OS: User Basics 200 1 006FMS20140 This Course Will Show You How To: - Access and personalize your CA File Master Plus for DB2 for z/OS environment - Browse and edit DB2 databases - Filter data using selection criteria - Extract and reload DB2 data.
CA File Master Plus for MVS: User Basics 200 1.5 006FMS20160 This Course Will Show You How To: - Access and personalize your CA File Master Plus environment - Browse, edit, and manage sequential, Virtual Storage Access Method ( VSAM), and partitioned datasets - Filter data using selection criteria - Match copybooks to files with single or multiple record types - Create batch jobs to operate on files and data - Logically organize groups of datasets for easy access

HostBridge
Course Title Duration
(Hours)
Course ID Description
HostBridge: Introduction to HB.js 100 .5 06HST10010 This Course Will Show You How To: Install the Eclipse HostBridge plugin. Create a “Hello World” test script. Using the Application Explorer. Writing basic code for HB.js. Adding Defensive Checks. Repurposing code.

CA IDMS™
Course Title Duration
(Hours)
Course ID Description
IDMS™: Introduction to ADS/Online .5 06IDM10070 This course provides an Introduction to ADS/Online.
IDMS™: Introduction to Application Prototyping in ADS/Online .17 06IDM10080 This course provides an introduction to Application Prototyping in ADS/Online.
CA IDMS/DB r18.x: Managing Security 200 .75 06IDM20260 This course is designed to introduce the new Database Administrator (DBA) to database security so they can ensure the safety of their site’s data. Managing Security is the third of three courses designed for the new DBA.
CA IDMS/DB r18.x: Managing the CV Environment 200 1 06IDM20270 This course is designed to introduce the new Database Administrator (DBA) to Central Version (CV) management so that they will be able to extract the best performance from their CV. Managing the CV is the second of four courses designed for the new DBA.
CA IDMS/DB r18.x: Database Maintenance 200 3.5 06IDM20280 This course is designed to introduce the new Database Administrator (DBA) to database maintenance using CA IDMS/DB. Understanding database maintenance allows the DBA to effectively maintain the integrity of their organization’s data. Database Maintenance is the first of three courses designed for the new DBA.
IDMS™: The ADS Language - Debugging ADS Dialogs 200 .5 06IDM20880 This course shows you how to read SNAP Dumps generated by the IDMS system when an ADS ABORT occurs. We will also show you how to use various utility commands, internal trace facilities, and diagnostic techniques to debug failures in ADS Dialogs. Finally, we will also show you how to use the IDMS/DC online Debugger as well as the ADS Alive Interactive Debugging facilities.
CA IDMS/DB r18.x: Performance and Tuning 200 2.5 06IDM20300 This course is designed to introduce the new Database Administrator (DBA) to how to analyze the performance of the CV and execute any necessary tuning so that they will be able to extract the best performance from their CV. Performance and Tuning is the third of four courses designed for the new DBA. Keywords: IDMS, IDMS/DB, r18, Performance and Tuning.
CA IDMS v18: Concepts and Facilities 200 4 06IDM20140 This course will introduce you to the database concepts and capabilities of CA Integrated Database Management System (IDMS), CA IDMS. After mastering the vocabulary used in the CA IDMS environment, you will explore the tools available for data management and application development.
CA IDMS Web Services r19.x: Introduction 100 .75 06IDM10050 In this course, students will learn about Web Services, in particular, CA IDMS Web Services Consumer, and the new functionality offered.
SQL and Web Connectivity for IDMS and Datacom 1 06IDM20290 This course will cover the implementation of relational SQL language for these databases, as well as how to enable SQL-compatible connectivity to CA Datacom and CA IDMS data from Web, Java and Windows environments. It is designed to enable you to create efficient data-driven web-based and server-based applications with this technology.
CA IDMS™  Version 19.0: Web Services for Modernization .75 06IDM20490 The vision of CA IDMS 19.0 is to improve CA IDMS modernization capabilities through features that enable customers to expand investments in core CA IDMS applications and improve developer productivity using modern skills and industry-standard technology.
CA IDMS™ Version 19.0: SQL Enhancements for Modernization .75 06IDM20500 Customers need to leverage their investment in CA IDMS to create new applications based on services in the application economy, and they need to do this with current technologies and developer skill sets.   This session shows how SQL enhancements in CA IDMS 19.0 improve standards compliance, developer productivity, and compatibility with third party tools and applications.  The SQL virtual foreign key feature enables developers to use standard SQL to access and update network databases without the need to use network DML or table procedures.  Enhancements to SQL DDL enable users to define databases using standard DDL compatible with other databases.
Installing CA IDMS 19.0 with z/OSMF 200 .25 06IDM20600 NA
z/OSMF –Introduction, Process, and Impact to Existing Customers 200 3.5 06MFO20270 The following topics are covered: CA Mainframe Software Manager & New Standard For Mainframe Software Management (30 minutes) Software Update: Modernizing the Maintenance of z/OS Software (50 minutes) Make Your Transition to Software Maintenance in z/OSMF Simple (40 minutes) Software Configuration: Automating the Configuration of z/OS Software (50 minutes) Software Installation: Simplifying the Acquisition and Deployment of z/OS Software (45 minutes)
Creating Your First ADS/Online Application 200 .75 06IDM20630 In This Course, You Will Learn How To: Create a Map. Create a Dialog. Create an Application.
IDMS™: ADS/Online and the Integrated Data Dictionary 200 .75 06IDM20640 In This Course, You Will Learn How To: Invoke the IDD compiler to Create data elements, Create record definitions, and Create Dialog process modules. Use IDD to query the Data Dictionary and Use the IDD Menu Facility.
CA IDMS REST API: APIs and Integration Using Open Source Monitoring Tools .25 06IDM20540 In this video, you will see how you can use popular open source tools to monitor database performance metrics exposed by Zowe APIs. With little or no coding you can collect data over time for deep analysis and develop dashboards to display performance graphically.
An Introduction to CA ADS ™ Application Development 200 .75 06IDM20560 This video can serve as either an introduction to CA ADS or a refresher course for anyone needing to create or modify applications using the CA ADS family of tools.
Using the CA IDMS MQ Adaptor to Enhance Connectivity with Other Applications 200 .5 06IDM20570 In this video, you will see the capabilities of the CA IDMS MQ Adapter and how it can provide a robust and cost-effective way to enable your CA IDMS online applications to communicate with other MQ applications.
ADS/Online and the Integrated Data Dictionary .75 06IDM20640 In This Course, You Will Learn How To: Invoke the IDD compiler to Create data elements, Create record definitions, and Create Dialog process modules. Use IDD to query the Data Dictionary and Use the IDD Menu Facility.
ADS Language Overview 200 .5 06IDM20670 This course provides an overview of the ADS language, its syntax, structure, and command groups.
IDMS™: The Map Compiler (MAPC) 200 .5 06IDM20680 This course shows you how to use the Map Compiler to create and maintain 3270 maps.
IDMS™: The ADS Compiler (ADSC ) 200 .75 06IDM20690 This course shows you how to use the ADS Compiler to build fully functional ADS dialogs
CA IDMS™ Version 19.0: Implementation and Use of Generic VTAM Resources with Parallel Sysplex Features 1 06IDM10060 This session will cover the Generic VTAM Resource enhancement and Parallel Sysplex Features and how the two options combined can be leveraged to Improve 24X7 availability, balance workloads, and eliminate single point of failure for your CA IDMS systems.
IDMS™: The ADS Language – Network Database Commands 200 .75 06IDM20760 This course shows you how to code Network Database DML Commands within your ADS Dialogs and understand the concepts of Database Currency and Database Locking.
IDMS™: The ADS Language - Control and Conditional Commands 200 1 06IDM20780 This course shows you how to code Control and Conditional commands within ADS Dialogs. This course also includes the definition and invocation of ADS Subroutines.
Automatically Generate a REST API for your IDMS & Datacom Business 200 .5 06IDM20800 The video will cover what is a an API by reviewing the database modernization strategy. Also give an overview of database API generation by providing a demonstration of the API generation and deployment. The video will also cover the REST client application using generated API.
IDMS: The ADS Language – Map Modification Commands 200 .75 06IDM20810 This course shows you how to code Map modification commands within your ADS Online Dialogs. Also, you learn how to test the data fields on your Maps for various conditions after a map-in operation occurs.
CA IDMS/DB Database Version 19.x: Database Navigation 200 Part 1 .5 06IDM20370 NA
CA IDMS/DB Database Version 19.x: Database Navigation 200 Part 2 .5 06IDM20380 NA
CA IDMS/DB Database Version 19.x: Database Navigation 200 Part 3 .5 06IDM20390 NA
CA IDMS Version 19.x: New DBA Foundations Part 1A 200 .5 06IDM20400 NA
CA IDMS Version 19.x: New DBA Foundations Part 1B 200 .5 06IDM20410 NA
CA IDMS Version 19.x: New DBA Foundations Part 2A 200 .5 06IDM20420 NA
CA IDMS Version 19.x: New DBA Foundations Part 2B 200 .5 06IDM20430 NA
CA IDMS Version 19.x: New DBA Foundations Part 2C 200 .5 06IDM20440 NA
CA IDMS Version 19.x: New DBA Foundations Part 3A 200 .5 06IDM20450 NA
CA IDMS Version 19.x: New DBA Foundations Part 3B 200 .5 06IDM20460 NA
CA IDMS Version 19.x: New DBA Foundations Part 4 200 .5 06IDM20470 NA
IDMS: The ADS Language - Arithmetic and Assignment Commands .75 06IDM20840 This course shows you how to code arithmetic and assignment commands in an ADS/Online Dialog and invoke system-supplied built-in functions in your ADS process modules.

CA 1 Flexible Storage
Course Title Duration
(Hours)
Course ID Description
CA 1™ Flexible Storage™: Introduction 100 .5 06FST10010 N/A
CA1® Reporting with CA EARL 200 .75 06FST20010 This course shows you how to report with CA EARL. You will understand CA EARL Basics and describe what is needed for date processing and pattern masking while learning the record definitions and producing custom reports with the proper guidelines.
CA 1™ Flexible Storage™: Virtual Tape System 100 .55 06FST10020 This course teaches you how to understand Vtape , how it works, and why it is a good choice. You will also recognize how Groups, Filters, and Devices are used with Vtape and understand the implementation considerations and components.

Compliance Event Manager
Course Title Duration
(Hours)
Course ID Description
Compliance Event Manager: Create and Deploy Policy Statements .75 06CEM20010 This course provides an overview of the Compliance Event Manager (CEM) solution.
Compliance Event Manager – Overview 200 .17 06CEM20020 The course will cover how to u nderstand how Compliance Event Manager can help your business improve its overall security and describe how it can enhance monitoring and reporting.

CA Mainframe Application Tuner
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Application Tuner: Improving Application Performance Management .5 06MAT20030 This session will cover how to improve application performance management with CA Mainframe Application Tuner.
CA Mainframe Application Tuner: User Basics 200 1.5 06MAT20050 In this course, you will discover how to create and invoke monitor definitions and analyze monitored data so you can determine the underlying cause of performance issues and fine tune your applications for optimal performance. This will help your organization to more quickly fix performance issues, meet service level agreements (SLAs), improve customer service, and reduce resource costs.
CA Mainframe Application Tuner: PMA Component User Basics 200 1.5 06MAT20060 This course will introduce you to the PMA component and how to prepare and process the data. Lastly, the course will discuss the integration of PMA using modern development tools, specifically Zowe.
Mainframe Application Tuner (MAT): Customization 100 1 06MAT10020 This Course Will Show You How To: Customize the mandatory steps of MAT. Customize the optional steps of MAT. Customize the PMA component of MAT.

CA Top Secret
Course Title Duration
(Hours)
Course ID Description
CA Top Secret ® for z/OS: Overview 200 .5 06TSS20010 This course will show you what types of data losses could happen in your environment and what is required to start CA Top Secret. You will also learn what happens when a user signs on to the system and you will become familiar with the high-level design philosophy of a security database.
CA Top Secret® for z/OS: Implementing Security Database Design 200 1 06TSS20020 This course will show you how to design your security database and create the basis for your security database structure by submitting the CREATE commands for ZONE, DIVISION, DEPARTMENT, and PROFILE ACIDs. You will also learn how to run a batch report that will list the database structure in part or in whole.
CA Top Secret ® for z/OS : Identifying Users to CA Top Secret 200 1 06TSS20030 This Course Will Show You How To: Create user ACIDs with the necessary parameters for that ACID to be effective. Describe attributes and privileges and know when to use them. Assign profile ACIDs to provide resource authorization and FACILITY access.Describe additional commands to use when working with user ACIDs.
CA Top Secret® for z/OS: Using the Field Descriptor Table 200 .5 06TSS20040 This Course Will Show You How To: • Describe the Field Descriptor Table • Define entries in the Field Descriptor Table
CA Top Secret for z/OS: Using the Static Data Table 200 .25 06TSS20050 This Course Will Show You How To:•Describe the Static Data Table (SDT) record•Define Calendar and Time records
CA Top Secret for z/OS : Protecting Datasets and Volumes 200 1 06TSS20060 This course will show you what a resource is and how to take ownership of a resource. You will learn how to authorize access to a resource and how to use the ADD and PERMIT commands. You will learn how to move resource ownership without disturbing the authorizations that have been allowed to that resource.
CA Top Secret for z/OS : Determining the Search Algorithm 200 .5 06TSS20070 This Course Will Show You How To: Describe the search algorithm and how it is used. Use the search sequence to assist with security administration. Use TSSSIM to test the security file permissions.
CA Top Secret for z/OS : Protecting Other Resources 200 .5 06TSS20080 This Course Will Show You How To: Protect other resources beyond datasets and volumes.
CA Top Secret for z/OS : Using the Resource Descriptor Table 200 .25 06TSS20100 This Course Will Show You How To:• Explain how the Resource Descriptor Table (RDT) is used. • Define a new entry in the RDT.
CA Top Secret for z/OS : Defining Security Administrators 200 .75 06TSS20110 This course will show you what a resource is and how to take ownership of a resource. You will learn how to authorize access to a resource and how to use the ADD and PERMIT commands. You will learn how to move resource ownership without disturbing the authorizations that have been allowed to that resource.
CA Top Secret for z/OS : Activating a FACILITY 200 .25 06TSS20150 This Course Will Show You How To: Describe the steps to define a FACILITY. Activate a FACILITY.
CA Top Secret for z/OS : Defining FACILITY Controls 200 .25 06TSS20130 This Course Will Show You How To: Define FACILITY parameters
CA Top Secret for z/OS : Reports 200 .5 06TSS20160 This Course Will Show You How To: Describe the available report utilities. Set necessary parameters to run these utilities.
CA Top Secret for z/OS : Using BATCH and STC FACILITYs 200 .5 06TSS20140 This Course Will Show You How To: Describe the BATCH FACILITY. Describe the STC FACILITY. Define a started task to the STC table
CA Top Secret for z/OS : Defining Basic Global Control Options 200 .5 06TSS20120 This course will show you the basic global control options and their functions.
CA Top Secret for z/OS : Recovery Procedures 200 .25 06TSS20170 This course will show you how to recover your primary security file.

CA MICS® Resource Management
Course Title Duration
(Hours)
Course ID Description
CA MICS r12.x: Installation Configuration and Operations 200 1 06MIC20140 This course provides an in-depth review of the rich suite of configuration parameters available for CA MICS implementation and customization. These parameters allow you to configure CA MICS to meet the challenges unique to your organizations resource management requirements.
CA MICS r12.x: Admin Foundation 200 1.25 06MIC20190 This course provides the solid foundation required to ensure the optimal deployment of CA MICS Resource Management at your IT Data Center. The course material begins by explaining concepts and methodologies unique to CA MICS. Then all the steps involved in the installation of CA MICS are covered, from initial planning through implementation.
CA MICS r12.x: Installation Configuration and Operations 200 1.25 06MIC20200 This course provides an in-depth review of the rich suite of configuration parameters available for CA MICS implementation and customization. These parameters allow you to configure CA MICS to meet the challenges unique to your organizations resource management requirements.
CA MICS r12.x: Administration and Operations 2 06MIC20210 This course explains how to set up and implement the day to day processes used by CA MICS to process your IT data and populate the CA MICS database. The facilities available to extend CA MICS resource management data beyond the online database are covered, as well as the processes used to change your CA MICS configuration to meet your evolving IT requirements.
CA MICS r12.x: Advanced Administration 200 1.25 06MIC20220 This course takes the MICS administrator beyond the basics. Best practices, gleaned from decades of resource management experience are presented and explained. The course demonstrates how to use internal CA MICS administrator utilities to fine tune and optimize your CA MICS deployment. And finally, a top to bottom explanation is provided of the CA MICS interfaces used to acquire, apply, and audit maintenance and product enhancements for your CA MICS installation.
CA MICS r12.x: Reporting 200 1.5 06MIC20230 This course provides an in‐depth review of the facilities available to generate the reports and charts you need to manage your IT infrastructure and workloads. From ad‐hoc analysis through the creation of production reporting and web publishing,the course materials explain the rich reporting options available for extracting and visualizing the valuable information stored in your CA MICS database.
CA MICS Performance Series: Analysis of SAS BUFNO/PAGESIZE Options 200 .5 06MIC20240 This video will highlight best practices for SAS performance improvement for CA MICS batch processing by updating buffer parameters to exploit the latest software changes
MICS®: Tips for Successfully Applying MICS Resource Management Maintenance .55 06MIC20290 This session will cover the strategies, checklists, and tools that you can use to successfully bring your MICS installation to current while minimizing outages.

Mainframe Resource Intelligence(MRI)
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Resource Intelligence: Overview Foundations 100 .25 06MRI10010 This Course Will Show You How To: Explain the value of CA Mainframe Resource Intelligence via a use case. Describe, at a high level, the what, why, and how of CA Mainframe Resource Intelligence. Explain how CA Mainframe Resource Intelligence gathers and secures your data.

Non-Product Specific
Course Title Duration
(Hours)
Course ID Description
Mainframe Essentials: Software Risk Assessment 200 .25 06MFO20390 This Course Will Show You How To: Describe the Software Risk Assessment. Configure the information that you want to display when viewing a list ofSMP/E-maintained products. Obtain a list of available maintenance for a selected product. Understand the risk severity associated with each unapplied PTF. Obtain a summarized risk level of all of the SYSMODs. Generate product lifecycle information for all vendors that are configured. Identify the source of the PTFs via the CSI, XMLLIB, and Retrieve fields.
Automated Testing for Mainframe Applications 100 .75 06MFO12010 This course is designed to introduce you to the concept of automated testing for mainframe applications and introduce you to one example of the many products available for your automated testing needs.

CA OPS/MVS® Event Management and Automation
Course Title Duration
(Hours)
Course ID Description
CA OPS/MVS Mainframe Team Center -Automation Component Release 13.5:Overview 100 .25 06OPS10010 This Course Will Show You How To: Describe, at a high level, the purpose of Mainframe Team Center –Automation. Explain how Mainframe Team Center -Automation Rules Management and System State Manager functions help you easily monitor rule implementation and resource states across multiple systems.
CA OPS/MVS Event Management and Automation Components Release 13.5: Overview 100 .25 06OPS10020 This Course Will Show You How To: Describe, at a high-level, the business value of CA OPS/MVS. Explain the roles of the components, product integrations, and functionality that comprise CA OPS/MVS.
CA OPS/MVS Automation Point Overview 100 .25 06OPS10030 This Course Will Show You How To:  Take the simple recommended actions that help ensure a good product experience. Explain the key product features and components. Explain the product architecture.
Mainframe Topology: Introduction 100 .25 06OPS10040 This Course Will Show You How To: Describe Mainframe Topology. Navigate and obtain topology data from the Hierarchical and Connected views.
OPS/MVS®: Migrating from SOLVE®:OPS: Feature Comparison, Migration Path, Value-Add, & Next Steps 100 .5 06OPS10050 This course consists of a downloadable presentation that helps aid your migration to OPS/MVS from SOLVE:OPS.
OPS/MVS®: Migrating from Opera: Feature Comparison, Migration Path, Value-Add, & Next Steps 100 .25 06OPS10060 This course consists of a downloadable presentation that helps aid your migration to OPS/MVS from Opera.
CA OPS/MVS Automation Point Installation 200 .25 06OPS20010 This Course Will Show You How To:  Prepare to install CA OPS/MVS Automation Point.  Complete the CA OPS/MVS Automation Point server and client installation procedures.
CA OPS/MVS® Event Management and Automation Release 13.5: OPSVIEW TSO User Interface Overview 200 .75 06OPS20020 This course provides an introduction to OPSVIEW, a full-screen, menu-driven TSO user interface that provides ISPF panels for performing various z/OS system functions. In addition, z/OS system operations and automation programming staff use OPSVIEW to manage CA OPS/MVS.
OPS/MVS® Event Management and Automation Version 14.0: OPSLOG Navigation 200 .5 06OPS20030 This Course Will Show You How To use OPSLOG Navigation.
CA OPS/MVS Automation Point: Administrative Topics 200 1 06OPS20100 This course contains a collection of downloadable PDF presentations that are designed to help you use and administer CA OPS/MVS Automation Point.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Overview .5 06MVS20050 This course provides you with an overview of how SSM can be used to implement cross system resource management. At the end of this training, you will be able to describe how SSM works to control the state of managed system resources. This course is also available as part of CA OPS/MVS Event Management and Automation r12.x: System State Manager 200 Bundle. Course Code 06MVS2009B.
CA OPS/MVS Event Management and Automation r12.x: External Security 200 .5 06MVS20060 This course shows you how CA OPS/MVS can be configured to directly use a standard System Authorization Facility (SAF) call against defined resources rather than having to define user-specific decision criteris in Automated Operations Facility (AOF) security rules.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Implementations 200 1.5 06MVS20070 This course provides you with an understanding of how to implement SSM in your environment to manage system resources, specifically Started Tasks (STCs). At the end of this training, you will be able to perform basic SSM implementation to manage critical system resources.
CA OPS/MVS Event Management and Automation r12.x: System State Manager Maintenance & Troubleshooting 200 .5 06MVS20080 This course provides you with an understanding of how to troubleshoot and maintain the basic SSM implementation in your environment as your environment changes. At the end of this training, you will be able to update SSM configurations as per changing environment needs and troubleshoot basic SSM implementation.

CA NetMaster
Course Title Duration
(Hours)
Course ID Description
CA NetMaster Network Management for TCP/IP Product Navigation 100 .5 06NMR10100 This Course Will Show You How To: - Log in to CA NetMasterNM for TCP/IP. - Navigate between menus using shortcuts and concatenated commands. - Explain how to use the Function keys to facilitate product navigation. - Display selection lists. - Access and use the Command Entry screen. - Access and navigate the Activity Log.
CA NetMaster Web Portal Overview: Foundations 100 .25 06NMR10200 This Course Will Show You How To: Describe the CA NetMaster Web Portal. Log in, access product help, and navigate to views. Explore the Home and Summary views.
CA NetMaster Network Management for TCP/IP Tracing 200 .5 06NMR20130 This Course Will Show You How To:  Describe the purpose and benefits of using SmartTrace.  Explain the different SmartTrace types and their purpose.  Start a SmartTrace from a Connection List or from the IP Resource Monitor.  Perform a packet data search and decode packets.  Define, start, and stop a SmartTrace.  Save, Export, or Print a SmartTrace.  Generate an IPCS report.  Use the CTRACE data trace option.
CA NetMaster Network Management for TCP/IP Setup SmartTrace Security 200 .25 06NMR20150 This Course Will Show You How To:  Set up SmartTrace security to control access to packet payload data.
CA NetMaster Network Management for TCP/IP Network Diagnostics 200 .5 06NMR20160 This Course Will Show You How To:  Use the ping and traceroute functions to perform basic diagnostic tests.  Identify unsecured or improperly secured connections.  Troubleshoot slow response times.  Obtain diagnostic information about your connections.  Obtain IP security information to confirm that your IPSec is functioning as expected.
CA NetMaster® Network Management for TCP/IP: Customizer Overview – Parameters and the INIFILE 200 .5 06NMR20210 This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP administrators with the configuration parameters that occasionally require tuning. In addition, this course describes how using the INIFILE (initialization file) simplifies the process of updating the configuration of product regions across multiple LPARs.
CA NetMaster Network Management for TCP/IP: User ID Access Maintenance Subsystem Overview 200 .25 06NMR20220 This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP Administrators with the User ID Access Maintenance Subsystem (UAMS).
CA NetMaster® Network Management for TCP/IP: Business Application Overview 200 .25 06NMR20230 This course is designed to familiarize the next generation of CA NetMaster NM for TCP/IP Administrators with the process of manually defining and using a business application to categorize connections into groups based on criteria such as application or TCP/IP stack job name, local or remote port number, or remote address.
CA NetMaster Network Management for TCP/IP: Introduction to Event Detectors 200 .25 06NMR20260 This Course Will Show You How To:Identify the different types of event detectors.Monitor system events using event detectors
CA NetMaster Network Management for TCP/IP: Advanced Administration Tasks Overview 200 .25 06NMR20270 This Course Will Show You How To:Perform advanced alert configuration and administration.Manage printers.Work with activity logging.Explain how to use timer commands to schedule events.Customize commands.Create INI members.xplain the purpose of NCL.Identify useful product support commands
NetMaster Network Management for TCP/IP: Using the NetMaster API to Obtain TCP/IP Data 200 .25 06NMR20370 This micro-learning course consists of a recorded presentation that shows you how to extract data from NetMasterNM for TCP/IP using the NetMasterAPI Service. You can feed this data to your security information event management (SIEM) system, to your reporting platform, or consume the data using your existing business applications.

RAI
Course Title Duration
(Hours)
Course ID Description
Smart/RESTART: Restarting Db2 Applications and Resolving Application Performance Issues 200 .5 06RAI20040 This foundational course consists of three recorded demonstrations that are designed to teach you how to restart Db2 batch applications using Smart/RESTART.

CA RC/Query
Course Title Duration
(Hours)
Course ID Description
CA RC/Query for DB2 for z/OS Command Overview 200 .3 06RCQ20010 This Course Will Show You How To: Describe how CA RC/Query functions as a launch pad to perform multiple. DBA functions using the CA Database Management Solutions for DB2 for. z/OS products. Identify product-specific and general line commands you can use to take action on an object. Perform different functions against a table, such as browsing, copying, editing, or using RUNSTATS. View tablespaces and tablespace detail. Generate DDL or HDDL for an object. Use Quick Migrate to migrate an object from one subsystem to another. Use the WHERE clause. Use EXPLAIN functions to identify potential access path changes that result from a rebind.
CA RC/Query for DB2 for z/OS: Report Customization 200 .25 06RCQ20020 This Course Will Show You How To: Customize reports by changing the user profile options. Print or save a report to a PDS member. Use package list commands to rebind one or more packages. Use table list commands to examine primary and foreign key relationships.
CA RC/Query for DB2 for z/OS: Advanced Commands 200 .25 06RCQ20030 This Course Will Show You How To: Create reports that generate real-time statistics. Convert tablespaces with one table to partition-by-growth tablespaces. Obtain details about pending table changes and remove pending changes. Obtain information about VSAM tablespace or pageset characteristics. Use the IDAA-related commands. Use the routine list and reset header commands. Work in ISQL (interactive SQL).

CA Security
Course Title Duration
(Hours)
Course ID Description
Digital Certificate Overview 100 .5 06SEC10010 The course will cover what is a digital certificate and how a digital certificate is similar to a credit card. Also discussed will be the common types of certificates and a digital certificate’s "Chain of Trust." In this course, there will be specific references to ACF2, Top Secret, and RACF commands . Please note that text files associated with this course include the syntactically correct commands and the command responses available for download.
Digital Certificates: Keyring and Certificate Authorization 200 .25 06SEC20030 This video will cover the ACF2, Top Secret, and RACF authorization checks to access both keyrings and certificate private keys.
Debugging - SSL Keyring/Certificate Problems 200 .25 06SEC20150 This video will cover the common problems related to SSL keyring and certificate configurations and debugging tips.
Digital Certificates: Renewing Certificates - Internal Certificate Authority 200 .10 06SEC20160 In this video, you learn about the renewal process for certificates that an internal certificate authority has signed.
Digital Certificates: Renewing Certificates - External Certificate Authority 200 .25 06SEC20060 In this video, you learn about the renewal process for certificates that an external certificate authority has signed.
Digital Certificates: CA SMP/E Internet Service Retrieval Configuration 200 .25 06SEC20070 This video will show you: What is CA SMP/E Internet Service Retrieval and how it works How to obtain the certificates for CA SMP/E Internet Service Retrieval How to create the keyring, add the certificates, and set up user access Sample SMP/E RECEIVE ORDER JCL and commands
Broadcom Mainframe Software Security Fixes and Security Advisories 200 .25 06SEC20080 This Course Will Show You How To: Find Mainframe Security and Integrity Fixes on the Broadcom Support Portal. Find Mainframe Security Advisories and subscribe to Security Advisory notifications for your products. Use best practices to maintain Security and Integrity Fixes
Mainframe Software Management and Maintenance Tips and Tricks 200 .25 06SEC20090 This Course Will Show You How To: Use SMP/E Receive Order and CAUNZIP. Use Quick Solution or Product Lifecycle search on the Broadcom Support Portal. Use the SYSVIEW Module Analysis Tool. Get started with z/OSMF.
Digital Certificates: Client Server Certificate Configuration and Authentication 200 .25 06SEC20100 The course will cover the different types of SSL Client and Server configurations, the Client and Server Certificate and Keyring/Keystore sample configurations, and how are certificates used in Client and Client/Server SSL authentication.
Digital Certificates: Keyring and Certificates Security 200 .25 06SEC20140 The course will cover how authorization checks are done for both access to Keyrings and access to certificate private keys and how  administration security works with Keyrings and Certificates.

Security Insights Platform(SIP)
Course Title Duration
(Hours)
Course ID Description
CA Mainframe Security Insights Platform: Overview 100 .5 06SIP10100 This course provides an overview of the CA Mainframe Security Insights Platform to help you understand the benefits it provides and how to create and view the reports.
CA Mainframe Security Insights Platform: Identify Who Has Access to Your APF Libraries 200 .25 06SIP20100 This course will teach you how to use the Security Insights use case: "Identify who has access to your APF libraries" to create a report and view the results.
CA Mainframe Security Insights Platform: Examine Classification & Pervasive Encryption 200 .25 06SIP20110 This course will teach you how to use the Security Insights use case: "Examine Classification and Pervasive Encryption by Resource" to create a report and view the results.

CA SYSVIEW® Performance Management
Course Title Duration
(Hours)
Course ID Description
SYSVIEW Performance Intelligence: Introduction 100 .25 06SYS10050 This Course Will Show You How To: Describe how the products that comprise SYSVIEW Performance Intelligence support an open access API-first strategy, operational insights, capacity reporting, modern mainframe management, application performance insights, and the end-to-end visibility you require to run your business. Identify the products that comprise SYSVIEW Performance Intelligence. Identify the web-based training designed to help you familiarize yourself with each product.
CA SYSVIEW Performance Management Option for DB2 Overview 100 .25 06SYS10110 This Course Will Show You How To: - Explain the main functions of CA SYSVIEW for DB2. - Explain the CA SYSVIEW for DB2 architecture. - Select a subsystem to monitor - Navigate CA SYSVIEW for DB2. - Access the product help.
CA SYSVIEW Performance Management Option for DB2 Set Up Your User Profile 200 .25 06SYS20250 This Course Will Show You How To: - Define print destinations. - Allocate request libraries. - Define shortcut commands and PF keys.
CA SYSVIEW® Performance Management Option for DB2: Monitor Pool Metrics at the SSID Level 200 .25 06SYS20260 This Course Will Show You How To:  Monitor pool activity for the current interval.  Review pool activity for a selected historical interval
CA SYSVIEW® Performance Management Option for DB2: Monitor Application and Thread Performance 200 .5 06SYS20270 This Course Will Show You How To:  Navigate the active thread panels to obtain information to help diagnose issues with active threads.  Use accounting data to obtain more active and historical thread data.  Find and cancel problem threads.  Use thread history to identify recent threads that used excessive resources.
CA SYSVIEW® Performance Management Option for DB2: Monitor Current and Historical SQL Activity 200 .25 06SYS20280 This Course Will Show You How To:  Monitor real-time dynamic and static SQL statements.  View historical SQL activity.
CA SYSVIEW® Performance Management Option for DB2: Work with Probe and Trace Requests 200 .25 06SYS20290 This Course Will Show You How To:  Identify low-overhead and high-overhead trace requests.  Run a trace.
CA SYSVIEW® Performance Management Option for DB2: Use the Exception Monitor 200 .25 06SYS20300 This Course Will Show You How To:  Explain the purpose of the exception monitor.  Understand and execute the best practices for using predefined exceptions.  Update exceptions to proactively monitor DB2 subsystem, database, and application metrics.
CA SYSVIEW Performance Management Option for CICS: Advanced 300 1.5 06SYS30010 This Course Will Show You How To:Monitor CICS regions, Monitor CICS transactions, View CICS historical data, & View and set CICS thresholds and alerts
SYSVIEW Essentials: Getting Started .25 06SYS20450 This introductory course contains several short videos designed to help you begin using the capabilities of SYSVIEW Essentials right away
SYSVIEW Essentials: Sorting Data in a Display 200 .08 06SYS20460 This introductory course contains a brief video that demonstrates different methods that you can use to sort SYSVIEW Essentials data in a way that is meaningful to you.
SYSVIEW Essentials: Scrolling Data in a Display 200 .25 06SYS20470 This introductory course contains a brief video that demonstrates different methods that you can use to scroll through SYSVIEW Essentials data
SYSVIEW Essentials: Selecting and Filtering Data in a Display 200 .17 06SYS20480 This introductory course contains a brief video that demonstrates different methods that you can use to select and filter the data in a SYSVIEW Essentials display
SYSVIEW Essentials: SYSVIEW® Essentials: Access and Navigate the Online Help .08 06SYS20490 This introductory course contains a brief video that demonstrates different methods that you can use to access and navigate the online help in SYSVIEW Essentials.
SYSVIEW Essentials: SYSVIEW® Essentials: Access and Navigate the Online Help .20 06SYS20550 This introductory will show you how to troubleshoot SYSVIEW Essentials, engage with the Support team, and use the CAPTURE commands to gather diagnostic data to share withBroadcom Support
SYSVIEW PM: Getting Started with Displays, Menus, and Commands .20 06SYS20580 This course will show you how to Access the SYSVIEW menu and set it as your main menu.Describe the different components of the SYSVIEW displays.Navigate the SYSVIEW menus and displays.
SYSVIEW PM: Accessing and Navigating the Online Help 200 .1 06SYS20640 This Course Will Show You How To: Access help via a help menu, a list of help topics, or by issuing the FINDHELP command. Obtain command-specific and context-specific help.
SYSVIEW PM: Scrolling Data in a Display 200 .15 06SYS20650 This Course Will Show You How To: Issue scroll commands. Scroll by using the function keys. Modify the scroll value to limit how far each page scrolls. Set a scroll value across all of the displays.
SYSVIEW PM: Selecting and Filtering Data in a Display 200 .15 06SYS20660 This Course Will Show You How To: Use operators to select values that meet specific criteria. Display all active filters. Remove all active filters. Extend the command line. Use AND or ORin your selection criteria. Select data that adheres to a specific condition.
SYSVIEW PM: Sorting Data in a Display 200 .1 06SYS20670 This Course Will Show You How To: Sort data in a SYSVIEW display. Set a sort profile. Identify the sorts that are applied to a display. Remove the sort. Save the sort.
SYSVIEW PM: Working with Support 200 .15 06SYS20680 This Course Will Show You How To: Troubleshoot SYSVIEW. Engage with the Support team. Use the CAPTURE commands to gather diagnostic data to share with Broadcom Support.
CA SYSVIEW Performance Management: Create Thresholds and Alerts 200 .5 06SYS20140 NA
CA SYSVIEW Performance Management: Capture and Act on Events 200 .5 06SYS20150 NA
CA SYSVIEW Performance Management: Create Single Views Across Multiple LPARS 200 .5 06SYS20160 NA
CA SYSVIEW Performance Management: Describe JES Content 200 .5 06SYS20170 NA

Trusted Access Manager for z/OS (TAMz)
Course Title Duration
(Hours)
Course ID Description
Trusted Access Manager for Z(TAMz): Overview 100 .25 06TAM10020 This course provides an overview of the Trusted Access Manager for Z solution
TAMz: Performing Self-Elevation to Gain Privileged Access 200 .12 06TAM20020 This video will demonstrate how a Systems Programmer who no longer has 24x7 access to a system critical parameter library and accessing it results in an authorization failure.
TAMz: Performing Self-Elevation to Gain Privileged Access 200 .13 06TAM20030 This video will demonstrate how a Systems Programmer who previously elevated to gain access to a system critical parameter library removes the entitlements gained from elevation.

CA Vantage™ SRM
Course Title Duration
(Hours)
Course ID Description
Vantage™: Monitor DFSMShsm in the Mainframe Team Center - Management Interface 200 .25 06VSR20140 This course shows you the objects that you can use to monitor DFSMShsmin the Mainframe Team Center -Management Interface to Vantage.
Vantage™: Monitor Your Vantage Environment Using the Mainframe Team Center Interface 200 .25 06VSR20150 This course shows you how to monitor Vantage and the z/OS system using objects in the Mainframe Team Center -Management interface to Vantage.
Vantage StoragePoint™ Web Client: Migrate Windows Client Host Definitions, User Options, & Views .25 06VSR20230 Vantage StoragePoint™ Web Client (Vantage StoragePoint) is an easy-to-use browser interface for Vantage, with centralized monitoring, configuration, and policy-based automation features.
Vantage StoragePoint™ Web Client: Getting Started 200 .5 06VSR20260 This Course Will Show You HowTo: Navigate using the User Menu, Navigation Pane, and Dashboards. Explain the differences between public and private hosts. Create a private host. Understand factory dashboards versus user-defined public or private dashboards. Create and modify a dashboard or user view. Understand the differences between dashboards and user views. Export a dashboard chart. Import and export dashboard definitions. Customize object data collection and presentation. Evaluate, view, and perform actions on an object.
Vantage StoragePoint™ Web Client: General Object Automation 200 .25 06VSR20270 This Course Will Show You How To: Explain automation concepts. Describe General Object Automation (GOA). Use the GOA wizard to define and customize Object Automation events.
Vantage StoragePoint™ Web Client: Monitor Your Vantage Environment 200 .25 06VSR20280 This course shows you how to monitor Vantage and the z/OS system using objects in Vantage StoragePoint.
Vantage StoragePoint™ Web Client: Join Objects 200 .25 06VSR20290 This course prepares you to join objects using Vantage StoragePoint.
Vantage StoragePoint™ Web Client: Role-Based Security .33 06VSR20300 VantageStoragePoint™WebClient(VantageStoragePoint)isaneasy-to-use browser interface for Vantage,with centralized monitoring,configuration,and policy-based automation features.
Vantage StoragePoint™ Web Client: Monitor DFSMShsm .25 06VSR20310 This course shows you the objects that you can use to monitor DFSMShsminVantage StoragePoint.
Vantage StoragePoint™ Web Client : Object Logging & Trend Reports 200 .25 06VSR20320 This course prepares you to set up object logging and create trend reports using Vantage StoragePoint.
VantageStoragePoint™ Web Client: Create Summary Objects 200 .25 06VSR20330 This course shows you how to create summary objects in Vantage StoragePoint.
Vantage StoragePoint™ Web Client: Scripts & Event Servers 200 .25 06VSR20340 This course prepares you to work with scripts and control the event servers using Vantage StoragePoint.

View
Course Title Duration
(Hours)
Course ID Description
View: Using the SARFSS Started Task to Collect Reports .20 06VIE20010 This Course Will Show You How To: Collect ACIF (AFP) reports and resources. Collect PDF reports. Collect text reports.
View™: Using the SARSTC Started Task for SYSOUT Archival and to Run Backups 200 .20 06VIE20020 This Course Will Show You How To: Use the SARSTC task for SYSOUT archival. Use the SARSTC task to run backups of the View database. Start and stop the SARSTC started task.

TPX
Course Title Duration
(Hours)
Course ID Description
CA TPX ™ Session Management: Solution Overview 100 .25 06TPX10010 This course provides an overview of the CA TPX™ Session Management solution.
OnDemand CA TPX Session Management for z/OS: User Administration 200 1.25 06TPX20060 In this course, you will learn about CA TPX user administration, including access and security settings for the various roles. This course content is presented as an overview of the product and its features along with several interactive demonstrations.
On Demand CA TPX Session Management for z/OS: System Administration 200 1.5 06TPX20070 In this course, you will learn about CA TPX system administration, including resource tables, security setting and Printing. This course content is presented as an overview of the product and its features along with several interactive demonstrations.
CA TPX Session Management for z/OS: ACL/E 200 .5 06TPX20080 In this course, you will learn about using ACL/E (Automated Conversation Language - Extended) programs with CA TPX and how to use the major commands available for ACL/E programs. This course content is presented as an overview of the product and its features.
TPX™ Session Management Introduction for New Users 100 .5 06TPX10060 This course will explain session management and how the TPX session manager makes your job easier. You will learn to log into TPX, start sessions, and access your applications. You will also use TPX commands to lock and unlock your terminal, send and receive messages through TPXMAIL, and access online help. In addition, you will learn about some useful TPX features that may be available at your site.
TPX™ Session Management - Setting Your User and Session Options 100 .17 06TPX10070 This course will show you how to access the TPXADMIN application and set user options and session options . It shows the TPX panels that an end user will typically see and assumes that you know how to log on to TPX, select sessions from the TPX menu, and use the PF function keys.

XCOM
Course Title Duration
(Hours)
Course ID Description
How to Install XCOM Data Transport For Windows 12.0 and Run an Effective Transfer 100 .08 06XCO10010 In this video, you will be able to: Access the How to Install XCOM™ Data Transport® For Windows 12.0. Download and install java. Download and install XCOM™ Data Transport® For Windows 12.0. Run a transfer with XCOM™ Data Transport® For Windows 12.0
CA XCOM Data Transport: Installation 200 .5 06XCO20010 This course provides information on how to install CA XCOM Data Transport on a UNIX/Linux or Windows platform.
CA XCOM Data Transport: Configuration Parameters 200 .25 06XCO20020 This course provides information on configuration parameters available for CA XCOM Data Transport on a UNIX/Linux or Windows platform.
CA XCOM™ Data Transport®: Setting up SSL .5 06XCO20030 This course provides information on how to configure a Secure Socket Layer (SSL) connection to perform a secure data transfer using CA XCOM Data Transport on a UNIX/Linux or Windows platform.
CA XCOM™ Data Transport®: Data Transfer .5 06XCO20040 This course provides information on starting the CA XCOM Data Transport GUI and initiating a data transfer using the GUI or command on either the UNIX/Linux or Windows platform.
CA XCOM Data Transport for Windows: History Reports 200 .25 06XCO20050 "This Course Will Demonstrate How To: Generate and view history reports using the CA XCOM Data Transport GUI. Export and view history records using commands"
CA XCOM Data Transport: Maintenance 200 .25 06XCO20060 This course provides information on debugging, tracing, and maintenance for CA XCOM Data Transport on a UNIX/Linux or Windows platform.
XCOM Data Transport for z/OS: Installation 200 1 06XCO20070 This course provides an overview of the requirements for installing XCOM Data Transport for z/OS and describes the methods for installation.
XCOM Data Transport for z/OS: Configuration 200 .5 06XCO20080 This course covers the configuration of the started tasks and jobs required for XCOM Data Transport for z/OS.
XCOM Data Transport for z/OS : Data Transfer 200 1 06XCO20090 This course covers how to use XCOM Data Transport for z/OS to perform data transfers using batch or the ISPF interface.
XCOM Data Transport for z/OS : Setting Up SSL 200 .75 06XCO20100 This course covers how to configure a Secure Socket Layer ( SSL) connection to perform a secure data transfer using XCOM Data Transport for z/OS.
XCOM Data Transport for z/OS : History Reports 200 .25 06XCO20110 This course covers how to get information about data transfers from the XCOM Data Transport for z/OS history file.
XCOM Data Transport for z/OS: Control Center 200 .5 06XCO20120 This course provides an overview of using Control Center to view and manage XCOM Data Transport for z/OS server transactions and view transaction status.
XCOM Data Transport for z/OS : Maintenance 200 .5 06XCO20130 This course provides information on debugging, tracing, and maintenance for XCOM Data Transport for z/OS.
XCOM Data Transport for z/OS: Pervasive Encryption 200 .25 06XCO20140 This course provides information on using IBM Pervasive Encryption for the encryption of output data sets with XCOM Data Transport for z/OS.

SMP/E
Course Title Duration
(Hours)
Course ID Description
SMP/E Internet Service Retrieval Configuration .1 06MFO20370 In this presentation, we will go over what SMP/E Internet Service Retrieval is in addition to a high level overview of how it works. We will show you where to obtain the digital certificates required for the configuration and give sample commands for creating a keyring to add the certificates to. There will also be sample commands for granting user access to the certificates and keyring.

CA Spool
Course Title Duration
(Hours)
Course ID Description
Spool™: Version 14.0 Feature Overview 100 .75 06SPO10010 This course consists of a recorded presentation designed to introduce you to the features that are available in Spool Version 14.0. The presentation includes several demos.
CA Spool: Migrating from CA Spool AFP Transformers to Java Transformers 200 .5 06SPO20010 This Course Will Show You How To:Understand the migration process.Explain the differences between the AFP and Java transformers.Customize the transformer parameter files.
CA Spool: Plug-in for ZoweCLI 200 .5 06SPO20020 This Course Will Show You How To:Explain the purpose of Zoweand Zoweplug-ins.Install and operate the CA Spool plug-in for the ZoweCLI.
CA Spool: Java Transformers Installation 200 1 06SPO20030 This Course Will Show You How To:Describe the CA Spool Java transformers and their benefits.Identify the software requirements for installing the Java transformers.Understand the installation process.Explain the post-installation steps
CA Spool Upgrading from Version 12.0 to Version 14.0 200 1 06SPO20040 This Course Will Show You How To: Describe the installation and upgrade process. Identify the new, updated, and deprecated product features.

WatchTower Platform
Course Title Duration
(Hours)
Course ID Description
WatchTower Platform z/IRIS: An Introduction .17 06WTP10010 This course will show you how to describe, at a high-level, how using WatchTower Platform z/IRIS allows you to expand your enterprise observability capabilities to include mainframe data.
WatchTower Platform: An Introduction 100 .17 06WTP10020 This Course Will Show You How To: Describe how the WatchTower Platform can help you streamline crucial problem identification and remediation processes by integrating operational tools, workflows, data, and insights from various sources. Describe how WatchTower Platform z/IRIS® helps you incorporate mainframe performance data into your strategic enterprise observability tools. Identify which WatchTower Platform role-based training is available to you.
WatchTower Platform: Overview of the Mainframe Installation Requirements and Process 200 .19 06WTP20010 This Course Will Show You How To: Describe the WatchTower Platform architecture. Identify the z/OS system requirements. Understand the different parts of the WatchTower Platform installation process on the Mainframe. Locate the documentation to guide you through each step of the installation process.
WatchTower Platform: Install and Deploy the Distributed Components (Kubernetes) 200 .5 06WTP20020 This Course Will Show You How To: Describe the WatchTower Platform Architecture. Complete the pre-installation tasks. Prepare the installation host system. Download and push the WatchTower OCI images to the registry. Prepare the digital certificates. Provision the storage space. Provide the installation values and run the installation. Make the WatchTower UI available. Configure the service accounts.
WatchTower Platform: Installation Overview - Roles and Responsibilities 200 .07 06WTP20040 This Course Will Show You How To: Explain, at a high-level, the WatchTower Platform installation tasks that the Systems Programmer and Cloud Engineer will complete. Identify which WatchTower Platform role-based training is available to you.
WatchTower Platform Topology: Install, Configure, and Run 200 .19 06WTP20050 This Course Will Show You How To: Install, configure, and deploy WatchTower Platform Topology.
WatchTower Platform: Diagnose and Resolve an Alert 200 .17 06WTP20060 This Course Will Show You How To: Explain how you can use the Alert Insights, Machine Learning Insights, and Topology components of the WatchTower Platform User Interface to troubleshoot and resolve an alert.
WatchTower Platform z/IRIS: Configure the z/IRIS Client 200 .17 06WTP20070 This Course Will Show You How To: Explain, at a high-level, how data flows from WatchTower Platform z/IRIS to your APM tools. Edit the configfile. Customize the sample security JCL. Customize the started task and confirm client startup.
WatchTower Platform z/IRIS: Install and Configure an IronTap Docker Container .17 06WTP20080 This Course Will Show You How To: Explain, at a high-level, how data flows from WatchTower Platform z/IRIS to your APM tools. Install and configure an IronTapDocker Container.

CA Workload Automation
Course Title Duration
(Hours)
Course ID Description
CA Workload Automation ESP Edition: Overview 100 .25 06ESP10070 This course is designed to provide the next generation of CA WA ESP Edition users with an overview of the product architecture and terminology.
CA Workload Automation ESP Edition Foundations: Create Events 200 .25 06ESP20010 This Course Will Show You How To: Describe the purpose and function of events. Create, trigger, and simulate events in ISPF or the Workstation.
CA Workload Automation ESP Edition Foundations: Understanding Applications 200 .25 06ESP20020 This Course Will Show You How To: Explain the relationship between procedures and applications. Understand how application control-level statements determine when an application runs. Describe the concept of application generation. Identify the information that an application requires to run successfully.
CA Workload Automation ESP Edition Foundations: Understanding Procedures 200 .25 06ESP20030 This Course Will Show You How To: Describe the syntax that procedures support. Work with the CLANG syntax rules, constructs, and operators. Understand the calendar, job selection, symbolic variable, workload status, and system activity built-in functions.
CA Workload Automation ESP Edition Foundations: Using Variables to Automate Your Workload 200 .25 06ESP20040 This Course Will Show You How To: Describe the criteria for working with symbolic variables. Understand the difference between actual versus scheduled time in date and time symbolic variables. Describe the criteria for working with user-defined ariables. Resolve customized scheduling requirements by using the GENTIME command. Explain how to customize your JCL using the %INCLUDE, %ENDINCL, %EXCLUDE, and %ENDEXCL statements. Understand the structure of a global variable. Define a global variable table. Identify the commands used to control a global variable table.
CA Workload Automation ESP Edition Foundations: Working with Resources 200 .25 06ESP20050 This Course Will Show You How To: Describe the different resource types and scopes. Understand the role of the RESFILE, CPU, and NODE initialization parameters in implementing automated resource management. Add resources to jobs via statements or in workstation dialogs. Use the RESDEF command to define, display, delete, and update resources. Understand how to use the NOTWITH and ENQUEUE options to help control job access to resources.
CA Workload Automation ESP Edition Foundations: Customizing Applications 200 .25 06ESP20060 This Course Will Show You How To: Explain the differences between manual and external jobs. Describe the role of job details, job defaults, and optional predecessor specifications. Understand the purpose of release conditions, sub- applications, and the APPLJOB command. Describe the role of time dependencies and condition codes.
CA Workload Automation ESP Edition Foundations: Customizing Views to Monitor Your Workload 200 .5 06ESP20070 This Course Will Show You How To: Plan your customized view. Customize workload views using the Director component of Workstation. Customize the Consolidated Status Facility (CSF) display in ISPF.
CA Workload Automation ESP Edition Foundations: Monitoring and Controlling Your Workload 200 .5 06ESP20080 This Course Will Show You How To: Quickly identify job states/p-nodes (processing nodes). Monitor and control applications, sub-applications, and jobs using the Workstation Director component. Monitor and control workload using the Consolidated Status Facility (CSF) in ISPF. Monitor and control workload in the Application Monitor (AM). Work with the REQUEST, LINK, TASK, and MANUAL keywords. Understand the purpose of controlling jobs in a sub-application versus an application. Monitor and manage cross-application dependencies.
CA Workload Automation ESP Edition Foundations: Working with Alerts 200 .25 06ESP20090 This Course Will Show You How To: Understand the differences between job monitoring and alert processing. Describe the role the NOTIFY statement plays in events, including alert events. Define an alert.
CA Workload Automation ESP Edition Foundations: Generating Reports 200 .25 06ESP20100 This Course Will Show You How To: Generate the following types of reports: History, Scheduled Activity, JOBMAP and JOBTREEDescribe the role the NOTIFY statement plays in events, including alert events. Define an alert.
ESP Workload Automation Intelligence: Introduction to Automic Automation Intelligence 100 .5 06ESP20110 This Course Will Show You How To: Understand, at a high level, how to integrate ESP Workload Automation with Automic Automation Intelligence. Identify the Automic Automation Intelligence functions that are designed to: Analyze historical job performance. Provide real time monitoring via lists and graphical representations of data. Send alerts when an event meets user specified criteria. Generate configurable reports that include data from all schedulers on your system.
CA 7 Workload Automation r12.x: Architecture and Components Overview 100 .25 06SEV10120 This Course Will Show You How To: Define the major components of CA 7. Describe the required Base System and Common Services components. Compare the components in different CA 7 architectures. Get familiar with the Online and Batch Interfaces. Identify the features of different reporting programs.
CA 7 Workload Automation: Optional Integrations 200 .25 06SEV20280 This Course Will Show You How To: Describe how AAI works with Service Level Agreements (SLA). Describe the instance architecture of CA 7 Server for AAI. Name the required components for Optional Integration. Describe the function of different components in Workload Automation Agents. Get familiar with services provided by CA 7 REST API. Get familiar with the integration possibilities with other products.
CA 7 Workload Automation: Processing Flow 200 .25 06SEV20290 This Course Will Show You How To: Describe the main functions of CA7ONL and how they perform the processing activities. Interpret the information in CA 7 file storage managed by Datacom. Identify the five Status Queues by function. Describe the Logical Queue flow in CA 7 in steps. Be familiar with CA 7 SVC and STC.
CA 7 Workload Automation: Defining Workloads 200 .25 06SEV20300 This Course Will Show You How To: Understand the various mechanisms available to define workloads. Explain the order of items when defining the workload. Identify the information that is required when looking to define new workloads to CA 7. Set up basic mainframe and distributed job definitions.
CA 7 Workload Automation: Scheduling Workloads Overview 200 .17 06SEV20310 This Course Will Show You How To: Understand the CA 7 concept of scheduling. Name the three scheduling methodologies CA 7 applies. Describe the Schedule Scan process.
CA 7 Workload Automation: Creating Calendars 200 .25 06SEV20320 This Course Will Show You How To: Explain the important role of calendars in job scheduling. Describe the concept of adding a new calendar with batch methodology. Differentiate online and perpetual calendars. Define and maintain calendars with 3270 or Web Client.
CA 7 Workload Automation: Scheduling Workloads Walkthrough 200 .25 06SEV20330 This Course Will Show You How To: Describe the Schedule ID (SCHID) concept. Schedule workloads with Web Client and 3270.
CA 7 Workload Automation: Using Triggers to Schedule Workloads 200 .20 06SEV20340 This Course Will Show You How To: Describe the concept of event based scheduling. Use triggers to schedule workloads via the Web Client or 3270
CA 7 Workload Automation: Dependencies and Requirements .30 06SEV20350 This course introduces the concepts of predecessors and walks you through defining CPU Job, Data Set, and User Memo Form as predecessors with both Web Client and 3270.
CA 7 Workload Automation: Using Virtual Resources .25 06SEV20360 This course introduces the concept of virtual resources and their different types and shows users how to define them in both Web Client and 3270.
CA 7 Workload Automation: Automating JCL 200 .33 06SEV20370 This course introduces how CA 7 obtains and controls JCL, use JCL control cards to provide additional job management capabilities, and how to edit JCL in both Web Client and 3270.
CA 7 Workload Automation: ARF Overview 200 .25 06SEV20380 This course introduces learners to Automatic Recovery Facility (ARF), and how it can be used in a particular environment.
CA 7 Workload Automation: Monitoring and Managing 200 .58 06SEV20390 This course introduces how to use the display commands to monitor the active workload and research the cause of problems, and how to use action commands to manage the active workload and correct scheduling issues.
CA 7 Workload Automation: Reporting and Graphs 200 .25 06SEV20400 Describe the reports and graphs available in CA 7 to help manage and plan your workload processing.

Workload Automation Agents
Course Title Duration
(Hours)
Course ID Description
Workload Automation Agent Manager: Introduction 100 .17 06WAM10010 This course is designed to introduce the capabilities of the Workload Automation Agent Manager, and demonstrates how to complete tasks that can be performed by Operators and Administrators. More information about Administrator-specific tasks is provided in the CA 7 and ESP Workload Automation product documentation.

z/OSMF
Course Title Duration
(Hours)
Course ID Description
z/OSMF –Introduction, Process, and Impact to Existing Customers 200 3.5 06MFO20270 The following topics are covered: CA Mainframe Software Manager & New Standard For Mainframe Software Management (30 minutes) Software Update: Modernizing the Maintenance of z/OS Software (50 minutes) Make Your Transition to Software Maintenance in z/OSMF Simple (40 minutes) Software Configuration: Automating the Configuration of z/OS Software (50 minutes) Software Installation: Simplifying the Acquisition and Deployment of z/OS Software (45 minutes)
Acquire a z/OSMF Portable Software Instance .1 06MFO20330 This course will cover how to order a z/OSMF Portable Software Instance from the Broadcom Support Portal and Register that portable software instance in z/OSMF.
Z/OSMF Product Installation .3 06MFO20340 This course covers using z/OSMF Software Management to install a Portable Software Instance.
Migrating SMP/E environments into z/OSMF .1 06MFO20350 This course covers migrating both Chorus Software Manager(CSM) and non CSM managed SMP/E environments to z/OSMF.
z/OSMF Software Update .1 06MFO20360 This course will cover the three types of maintenance that can be applied with z/OSMF Software Update.
zOSMF Create Service Order 200 .1 06MFO20380 zOSMF Create Service Order 200
  »  CICS v5.6
Course Title Duration Description
CICS Transaction Server Operations 5.6 Series
CICS TS - CICS Transaction Server Introduction 5.6
4 The CICS TS - CICS Transaction Server Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated.
CICS TS - CICS Explorer Fundamentals 5.6
3 This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered.
CICS TS - Controlling CICS Transaction Server Operations 5.6
6 The CICS TS - Controlling CICS Transaction Server Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems.
CICS TS - CICS Command Simulation 5.6
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS.
CICS Transaction Server Programmers 5.6 Series
CICS TS - Programming Basics 5.6
6 The CICS TS - CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product.
CICS TS - Program Control and Communication 5.6
6 The CICS TS - Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas.
CICS TS - Files and Databases 5.6
4 This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2.
CICS TS - Storage and Transient Data 5.6
4 This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues.
CICS TS - Programming for Web Access 5.6
4 This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them.
CICS TS - Using CICS Transaction Gateway 5.6
3 This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS.
CICS TS - Terminal Communications 5.6
6 The CICS TS - CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment.
CICS TS - Using SDF II to Maintain CICS TS Maps 5.6
2 This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps.
CICS TS - Programming for Recovery 5.6
3 This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery.
CICS TS - Debugging CICS Programs 5.6
4 The CICS TS - Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces.
  »  Coaching and Mentoring for Technical Specialists
Course Title Duration Description
Coaching and Mentoring for Technical Specialists Series
Coaching and Mentoring for Technical Specialists
2 The Coaching and Mentoring for Technical Specialists course begins by explaining how learning has evolved from the traditional on-the-job and classroom training, to a myriad of learning resources to suit a wide range of people. Coaching and mentoring are introduced, describing how they differ and the benefits they can provide. These items are then discussed in more detail outlining various coaching and mentoring models, and how they can be implemented and managed. Several scenarios involving technical coaching and mentoring are presented, allowing you to relate to how these types of programs can run in your environment.
Course Title Duration Description
CLIST Series
CLIST – Basics 3 The CLIST Basics course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS..
CLIST – Advanced CLIST Coding 4 This course exposes the learner to more advanced CLIST functions available for developing executable CLISTs. Topics cover aspects such as control variables, built-in functions as well as defining CLIST options and using error and attention exits.
CLIST – Performing I/O with CLIST
1 This course focuses on using CLISTs for the purpose of reading and interpreting data entered from the terminal. Also discussed are how CLIST can be used to read and write data to and from data sets.
  »  Cloud Computing
Course Title Duration Description
Cloud Computing Series
Introduction to Cloud Computing
3 This course provides an overview of cloud computing concepts including key characteristics, cloud services, and cloud deployment models. It discusses the mainframe’s role in cloud computing and then looks at the future developments around cloud computing.
Understanding Cloud Architecture
3 This course looks at cloud architecture and what technologies and methods are utilized to develop and deploy modern cloud applications.
Cloud Security
1 This course provides an overview of the security measures that need to be considered when implementing an organization’s cloud environment. It discusses the importance of security and compliance, and highlights some of the tools and security mechanisms that can help ensure an organization’s data integrity and security is maintained.
Cloud Governance
1 For organizations to successfully transition their business to the cloud they should consider strategies that will minimize associated risks. This course introduces concepts around what cloud adoption and cloud governance is and what strategies and processes are needed to ensure a business utilizes tools to aid it in a successful transition to the cloud.
  »  COBOL Programming
Course Title Duration Description
COBOL Programming Series
COBOL Programming - Basics
6 The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions.
Data and Datafile Definitions in COBOL
4 The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways.
COBOL Programming – Manipulating Data
6 The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index.
COBOL Programming - Advanced
5 The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program.
COBOL - IBM Enterprise COBOL 6.3 for z/OS
4 The COBOL - IBM Enterprise COBOL 6.3 for z/OS course is designed for learners with a basic understanding of generic COBOL who need to extend its use to the z/OS environment. It describes how COBOL programs are made available through compile and bind processes and discusses coding and options specific to the z/OS environment. The use of IBM's Language Environment is presented, and a number of coding techniques used to improve the performance of COBOL running on z/OS, is also shown.
Accessing IMS Databases from COBOL
3 The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained.
  »  Containers Curriculum
Course Title Duration Description
Containers Series
zCX – Container Extensions for z/OS
1 The content of this course offers an introduction to the Docker platform and how z/OS Container Extensions (zCX) facilitates the running of Docker containers on z/OS. It includes an overview of the Docker images that are compatible with zCX and describes where they can be obtained. The course also explores various practical use cases that illustrate the benefits of implementing zCX. Additionally, the course provides detailed information on zCX, explaining how the zCX started task provides the infrastructure that Docker containers need to run, and how it leverages z/OS features.
Containers – Introduction to Containers, Docker, and Kubernetes
1 In this course, you will see how containers allow applications to be packaged with prerequisite software and tools for easier deployment. You will also learn how Docker enables developers to easily pack, ship, and run these containers, and how tools such as Kubernetes assists in managing them.
  »  Cryptography Curriculum
Course Title Duration Description
Cryptography 3.1 Series
Cryptography - Pervasive Encryption z/OS 3.1
1 This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption is today, a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z16 infrastructure are provided, describing how at rest, and in flight data associated with those components supports new and existing encryption capabilities.
Cryptography 2.5 Series
Cryptography - Pervasive Encryption z/OS 2.5
1 This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption is today, a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z16 infrastructure are provided, describing how at-rest, and in-flight data associated with those components supports new and existing encryption capabilities.
Implementing Pervasive Encryption on z/OS – Expert Videos
Expert Videos
1 This expert video series introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. Finally, some best practice for determining which data you should encrypt is presented.
  »  Databases Curriculum
Course Title Duration Description
Coding Db2 Applications for Performance Expert Videos Series

Db2 Coding - Defining Database Performance - Expert Videos
.5 In these expert videos, a breakdown of what constitutes performance in relation to Db2 applications is discussed. The presenter begins with a high-level view of performance, and the factors to be considered when coding, and managing Db2 applications.
Db2 Coding - Coding Relationally - Expert Videos
.5 These expert videos delve deeper into the relational aspect of Db2 databases, explaining how it impacts the way applications are coded. The presenter discusses traditional data processing techniques and describes how this process differs when coding for Db2 databases. A range of coding tips are presented that will improve the performance of your Db2 applications.
Db2 Coding - General SQL and Indexing Guidelines - Expert Videos
.8 These expert videos focus on the benefits of using indexes when accessing data through SQL. It begins by looking at using SQL to obtain only the data required, and minimizing the passes through that data. You will see how indexes can improve SQL performance and also where indexes cannot be used. Finally, you will see how the way that Db2 data is stored can also impact performance when accessing it.
Db2 Coding - Coding for Concurrent Access - Expert Videos
.8 These expert videos look at concurrency, how it works, and the performance benefits it can provide. You will see how Db2 table spaces, tables, pages, and rows can be locked and when each of these types of locks should be considered for use. Details on isolation levels, how they are specified, and the impact they have on your SQL program is also presented. A section on common concurrency problems including lock suspensions, timeouts, and deadlocks is covered, and how they can be avoided. You will also see how parallelism is enabled and how it is used to improve processing efficiency.
Db2 Coding - Understanding and Reviewing Db2 Access Paths - Expert Videos
.5 These expert videos begin by reviewing the role of the Db2 Optimizer and how it is used to satisfy SQL requests. You will then explore the various options for accessing data in a single table, and then take a look at the methods that Db2 can use to combine data when more than one table is accessed in your SQL code. Focus will then turn to filter factors, describing what they are, how you can calculate them for your data and queries, and how Db2 uses them to estimate the amount of data that it needs to access. Finally, methods that you can use to examine the access paths chosen by Db2 for your SQL queries will be discussed.
Db2 Coding - SQL Coding Tips and Techniques - Expert Videos
.8 These expert videos provide some tips and techniques for coding efficient SQL statements in your Db2 applications. You will discover several different ways to avoid writing code, for example by using existing Functions and Db2 Utilities, and see how reusable Db2 code in the form of stored procedures and triggers, can be created. You will also look at the use of dynamic and static SQL and when each should be used, and how to use set operations in Db2 to combine data from multiple queries in different ways and for different use cases. Finally, you will be introduced to general tips and techniques for writing SQL statements.
Databases Series

Databases – Introduction to Databases and Database Managers
4 This course provides you with a core understanding of the need for databases, the way they are structured, and the type of information they can hold. It describes the types of database models that you are likely to encounter and describes their pros and cons. The use of a Database Management System (DBMS) is discussed, providing examples of functionality and features that are often employed by users of it. Finally, you will see how a database is defined and configured, along with the types of tasks that need to be performed as part of this process.
Databases Introduction to SQL
4 This course begins by providing you with an overview of SQL functionality, and describes how SQL is used to obtain data from a database table. Once data has been obtained there are many scalar and aggregate functions that can be used for purposes such as creating a subset of that data, or manipulating the data itself into another format. This is discussed in detail. Finally, you will see how data can be added to a database, and how it can be modified, and deleted.
Databases – Advanced SQL
4 This course provides you with more in-depth uses of SQL. It begins by examining how data from multiple tables can be joined together, and how different types of JOIN statements can be used to achieve your goal. You will also see how specific data can be selected from tables and how conditional operations can be invoked based on data values. The merging of results from multiple SELECT statements is also presented. Finally, you will see how a SELECT query can exist within another SELECT statement. These are called subqueries.
Databases – Database Manager Resources
4 This course starts by providing you with the methods used to create a database and its components. It then introduces you to the commands used to alter database component attributes and shows you how to remove data. You will see how commonly used instructions can be saved as a stored procedure, and the benefits they provide. You will then look at user-defined functions (UDFs), how they are created, and how they differ from stored procedures. Finally, you will be presented with various methods for securing your database.
Databases – Database Communication
4 This course describes how local and remote clients can connect to a DBMS server. It discusses connection options including the use of APIs. You will also see how an administrator can view existing client connections and configure the DBMS to place restrictions on client activity. Finally, you will see how replication provide copies of database systems on alternate DBMS servers. This is useful for redundancy purposes.
Db2 v13 Operations Series

Db2 13 – Db2 Fundamentals
5 The Db2 13 – Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI.
Db2 13 – Managing Db2 Operations on z/OS
4 The Db2 13 – Managing Db2 Operations on z/OS course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart. You will be introduced to Db2 stored procedures on z/OS, and see how they are created and managed.
Db2 v13 Series
Db2 13 – Introduction to Db2
4 The Introducing Db2 course discusses the platforms on which Db2 can be implemented, and the core features that can be found with all Db2 versions. You will look at common Db2 components and see how they are used to store and manage Db2 data. An overview of IBM Data Studio is also presented, explaining how it is used to work with relational database management systems such as Db2.
Db2 13 – Creating and Maintaining Db2 Programs
5 The Create and Maintain Db2 Programs course describes how SQL can be invoked from an application program and the interaction that can occur between the application program and Db2. Measuring the success of the SQL is then discussed, and the use of SQLCA, and SQLSTATE to determine this. You will then see how cursors can be used to reference table data, and finally how Db2 data is saved and recovered using commits and rollbacks.
Db2 13 – Building Db2 COBOL Programs
3 This course discusses the steps required to create Db2 COBOL programs.
Db2 13 – Optimizing Db2 Application Performance
5 The Db2 13 – Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyze their effectiveness.
  »  Data Center Storage Management 2.5
Course Title Duration(Hours) Description
Data Center Storage Management z/OS 2.5 Series
Storage - Introduction to Storage and Disk Systems 2.5
3 This course describes how data center storage has evolved and its future in this environment. It then focuses on the hardware and software that comprises today's disk systems and how this meets the need of the data center.
Storage - Understanding Tape Storage 2.5
3 This course discusses how tape usage in data centers has evolved and looks at the purpose of this medium in today's environment. An overview of tape storage capabilities is discussed before looking at the emergence of virtual tape and how it is either replacing traditional tape systems, or working with them, to meet the data storage demands of the enterprise.
Storage - Networks, Administration, and DASD Management Using ICKDSF 2.5
4 This course provides an overview of network storage configurations and the monitoring and management tasks associated with the Storage Administrator role are also discussed.
Storage - Managing z/OS Data Using DFSMS Constructs 2.5
5 This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment.
Storage - Storage and Tape Administration Using DFSMShsm and DFSMSrmm 2.5
3 Initial content discusses space administration needs looking at data center backup and migration requirements, and then showing how this is achieved using DFSMShsm. The management of tape volumes and labels using DFSMSrmm is also covered in detail.
  »  DevOps and Agile
Course Title Duration Description
DevOps Series
DevOps - Introduction to DevOps in the Workplace
5 The DevOps - Introduction to DevOps in the Workplace course begins by discussing traditional software development and deployment, and how DevOps can be used to improve this process. A holistic view of DevOps is broken down to its core components describing the people and processes involved with each phase. The continuous DevOps integration, delivery, and deployment phases are explained along with common release management deployment techniques. An overview of the types of monitoring and reporting required to measure the effectiveness of DevOps practices is also provided showing how it feeds back into the DevOps cycle.
Agile Series
Agile Fundamentals
1 The Agile Fundamentals course discusses the business value of adopting an Agile philosophy, introducing a real-life software development project, and describing how Agile is used to restructure traditional software development and deployment tasks. The values and principles associated with the Manifesto for Agile Software Development are explained, while an overview of common frameworks used to adopt Agile philosophes is provided, along with their benefits. Additional Agile training, accreditation, and related supported products and practices are also mentioned throughout the course.
  »  Disaster Recovery
Course Title Duration Description Description
Business Continuity and Disaster Recovery Series
DR – Ensuring Data Center Business Continuity
3 BM Ensuring Data Center Business Continuity. This course is suitable for any staff requiring a broad understanding of an organization's requirements when it comes to Business Continuity and Disaster Recovery.
DR – Data Center Disaster Recovery Planning
5 Initial content is management-focused, covering the role of individuals and groups responsible for creating, modifying, and testing the organization’s Business Continuity Disaster Recovery (BCDR) program. It explains broadly the tasks that need to be performed and the consequences should they fail.
DR – Data Center Backup and Recovery Strategies
5 Initial content focuses on the importance for organizations to properly protecting their digital assets from data loss and data corruption. An overview of common data center backup strategies and methods is provided along with details on how encryption is used to safeguard backups. The benefits of using Geographically Dispersed Parallel Sysplex (GDPS) technologies is presented and the various configurations available with this solution are covered in detail. Cloud based facilities such as Disaster Recovery-as-a-Service (DRaaS), and Backup-as-a-Service (BaaS), are discussed, describing the benefits and challenges of each.
  »  Hardware Management Console
Course Title Duration Description
Hardware Management Console Series
HMC – Familiarization and Operation 2.16
3 This course introduces the student to the hardware management console (HMC) describing its function and importance in managing the IBM Z mainframe hardware. It describes how the HMC can be accessed, and job roles that can be configured for use. The HMC logon procedure is discussed, highlighting important information that is presented during this process. This is followed by an overview and familiarization of the HMC interface, and details on navigation techniques, and customization features. Finally, you will be introduced to a number of tasks that can be performed from the HMC, beginning with those most commonly performed and progressing to more advanced use. General information on using the HMC mobile app is also presented, covering implementation, customization, and operation of this tool.
  »  IBM Developer for z/OS
Course Title Duration Description
IBM Developer for z/OS Series
IDz – IBM Developer for z/OS Basics
4 This course introduces the programmer to the IBM Developer for z/OS (IDz) product describing its purpose and features, how it is installed, and access to resources on a host system.
IDz – Creating and Managing Applications Using IDz
4 This course describes the methods used to create, manage and maintain applications under IDz. It provides details on the benefits of projects and subprojects within IDz and the application tasks that can be performed within this structure. IDz testing and debugging capabilities are discussed in detail, in particular the ZUnit testing framework, and the IBM z/OS Debugger. The final module addresses the IDz features that allow you to create applications for Db2, CICS, and IMS.
  »  IBM Environment Introduction Curriculum
Course Title Duration
(hours)
Description
IBM Environment Introduction Expert Video Series
Sys Prog – Tips to Advance Your Systems Programmer Career – Expert Videos
.7 In this set of expert videos, Meral Temel presents a list of practical tips that will help you become a more successful Systems Programmer. She emphasizes that learning is something that never stops and that Systems Programmers today need to accept that they cannot know everything and to target smaller areas of learning, and to look at the big picture of work they are performing. She discusses the importance of note taking, creating to-do and to-learn lists, and planning, as well as providing ideas on how best to address troubleshooting. Finally, Meral discusses how learning about performance-related aspects of the mainframe will stand you in good stead as it is woven into almost every Systems Programmer task.
IBM Environment Introduction 3.1 Series
IBM (z/OS) – The Evolving Mainframe 3.1
3 This course describes what a mainframe is, how it has survived, and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components that you will find in a typical mainframe environment.
IBM (z/OS) – Working with the Mainframe 3.1
3 This course begins by explaining how data is stored in a mainframe and the type of security that protects it. It then discusses the core products used to prioritize and process that data. Locating system documentation is going to be important for anyone working on the mainframe, for example error message manuals, product installation processes, so knowing how to access it is important. This is covered in the last module of this course.
IBM (z/OS) – z/OS Systems Programming Basics 3.1
4 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, and the system data sets and parameters that are used to initialize and configure the z/OS system.
IBM (z/OS) – z/OS System Initialization & Configuration for Sys Progs 3.1
3 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization, and JES2 configuration. and how system data sets and parameters can be modified in response to system issues.
IBM (z/OS) – Application Programming Basics 3.1
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data.
IBM (z/OS) – Application Programming Environment Overview 3.1
6 This course discusses widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST, Java, and Python, and describes how the Language Environment provides many of these languages with common runtime routines.
IBM Environment Introduction 2.5 Series
IBM (z/OS) – The Evolving Mainframe 2.5
3 This course describes what a mainframe is, how it has survived, and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components that you will find in a typical mainframe environment.
IBM (z/OS) – Working with the Mainframe 2.5
3 This course begins by explaining how data is stored in a mainframe and the type of security that protects it. It then discusses the core products used to prioritize and process that data. Locating system documentation is going to be important for anyone working on the mainframe, for example error message manuals, product installation processes, so knowing how to access it is important. This is covered in the last module of this course.
IBM (z/OS) – z/OS Systems Programming Basics 2.5
4 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, and the system data sets and parameters that are used to initialize and configure the z/OS system.
IBM (z/OS) – z/OS System Initialization & Configuration for Sys Progs 2.5
3 This course provides the systems programmer with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization, and JES2 configuration. and how system data sets and parameters can be modified in response to system issues.
IBM (z/OS) – Application Programming Basics 2.5
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data.
IBM (z/OS) – Application Programming Environment Overview 2.5
6 This course discusses widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST, Java, and Python, and describes how the Language Environment provides many of these languages with common runtime routines.
  »  IBM Explorer for z/OS 3.2
Course Title Duration Description
IBM Explorer for z/OS Series
z/OS Explorer - IBM Explorer for z/OS
2 The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of the Remote System Explorer (RSE), z/OS and Resource perspectives, and the related views used to display and manage z/OS data.
  »  IBM LinuxONE Curriculum
Course Title Duration Description
IBM LinuxOne 4 Hardware Series
LinuxONE – Introduction to LinuxONE 4
3 In this course, you will see how IBM has addressed evolving IT trends and embraced Linux, surrounding it with enterprise standard hardware and software. You will delve inside different LinuxONE servers and look more closely at how they are structured and how they can be configured. You will also see technical improvements from previous LinuxONE models and how the LinuxONE Emperor 4 LA1 compares to the z16, the entry-level LinuxONE Rockhopper 4 LA2, and the LinuxONE Rockhopper 4 Rack Mount Bundle.
  »  IBM Mainframe Communications 2.5
Course Title Duration Description
IBM Mainframe Communications 2.5 Series
Comms – IBM Mainframe Communications Concepts 2.5
1 This course offers an overview of essential networking principles and introduces you to mainframe networking concepts, explaining how it has evolved.
Comms – Monitoring and Controlling VTAM 2.5
3 This course covers aspects around using VTAM commands to monitor and control various VTAM resources. Initially introducing VTAM display commands to check network status, and to diagnose and solve network issues, and later introducing how to use action commands to control the VTAM network and resolve problems.
Comms – Monitoring and Controlling TCP/IP 2.5
4 This course covers the fundamentals of TCP/IP, including its diverse features and functions. It also provides details on initiating and terminating TCP/IP, along with an introduction to a range of commands for monitoring and managing both TCP/IP client and server applications.
VTAM Console Simulations 2.5 Series
Comms – VTAM Command Simulations 2.5
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM.
  »  IBM Mainframe Performance and Capacity Management for z/OS 2.5
Course Title Duration Description
IBM Mainframe Performance and Capacity Management z/OS 2.5 Series
Z Performance - Introduction to Mainframe Performance for z/OS 2.5
3 The Introduction to Mainframe Performance course provides the learner with a core understanding of what performance measures are required when managing a mainframe environment. Measuring the usage of critical resources is discussed, and potential issues that can affect the performance of tasks running in a z/OS system are presented.
Z Performance - z/OS I/O Performance and Capacity Planning for z/OS 2.5
3 In this course you will examine the I/O process and see how I/O performance problems are detected, and the metrics used to determine where a problem may exist. Methods used to improve I/O performance are also discussed. Following this, an introduction to z/OS capacity planning is presented, describing the data required to identify future system growth and tips that can be used to better utilize existing resources before considering hardware or software purchases.
Z Performance - z/OS Performance Tools and Software Pricing for z/OS 2.5
2 In this course you will discover how SMF is used to capture important system activity and store it as specific record types. You will see how these records are structured and the utilities used to convert their content into a readable format. Commands used to display, configure and manipulate SMF are covered, as well as the process of archiving SMF records and creating your own SMF records. Following this, an introduction to software licensing is presented, describing common licensing models and the metrics they use to determine the cost to the customer. This information will assist the user in determining ways to minimize software licensing costs.
Z Performance - z/OS Workload Manager for z/OS 2.5
3 The Z Performance - z/OS Workload Manager course provides the learner with steps describing how WLM components are created and linked, to form a WLM policy. The course then progresses to discussing in detail various workloads and the goals and importance that should be assigned to them. This is followed by an overview of performance information that can be obtained through SMF records, MVS commands, and SDSF.
  »  IBM MQ
Course Title Duration Description
IBM MQ Series
IBM MQ - Introduction to IBM MQ
4 This course provides the learner with basic information about IBM MQ, initially describing how it is used and then branching out discussing its features. A detailed breakdown on IBM MQ components and their structure are provided, providing you with an overview on how it could be configured in your environment. Finally, the use of IBM MQ in a z/OS environment is covered with details on how it differs from other platforms.
IBM MQ - MQ Operations and Administration
6 This course begins by describing IBM MQ, and its common deployment options, and then is expanded to show how an IBM MQ queue manager is created. Various commands used to interact with MQ components are discussed throughout the remaining content, showing how definitions are created and displayed, and modifications that can be made to them. A focus on the security of MQ resources and authentication required to access them, is also presented.
IBM MQ - MQ Operations and Administration for z/OS
4 This course looks at the differences between traditional MQ, and how it is implemented and run in a z/OS environment. It discusses the use of z/OS datasets and files that need to be created as well as the procedures used to enable MQ in z/OS. You will see how traditional MQ commands map to z/OS, and how MQ resources are managed using z/OS online facilities and batch utilities. Security for MQ resources on z/OS is examined along with tools and utilities used for monitoring aspects of MQ performance.
IBM MQ - MQ for Application Programmers
4 This course begins by identifying the basic programming code used by applications to interact with IBM MQ. It describes the MQ messaging process and then delves more heavily into the commands that can be used to get and put MQ messages, and manage MQ objects. Details on programming with MQ in a z/OS environment is provided, explaining core differences when using that platform.
  »  IBM Z Mainframe Hardware
Course Title Duration Description
IBM Z Hardware Series
IBM Z – Introduction to the IBM Z Systems
1 This course describes how IBM Z hardware has evolved to cater for today’s enterprise data processing needs.
IBM Z – Hardware Models – z16
3 This course introduces the IBM z16 mainframe server, describing its capabilities and new features. It then focuses on the key z16 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z15
2 This course introduces the IBM z15 mainframe server, describing its capabilities and new features. It then focuses on the key z15 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z14
2 This course introduces the IBM z14 mainframe server, describing its capabilities and new features. It then focuses on the key z14 hardware components and the I/O structure used to transport data through the system.
IBM Z – Hardware Models – z13
2 This course introduces the IBM z13 mainframe server, describing its capabilities and new features. It then focuses on the key z14 hardware components and the I/O structure used to transport data through the system.
  »  IBM Z System Automation Curriculum
Course Title Duration Description
IBM Z System Automation Series
SA z/OS - Introduction to IBM Z System Automation
1 The Introduction to IBM Z System Automation course provides the learner with a basic understanding of what IBM Z System Automation is and how it can be used in today’s modern enterprise. The course begins with looking at some of the benefits the product provides in managing system resources through automation. The course also covers the various components that enable automation functionality. Finally, the course delves further into what tools are available for IT personnel to interact with use with IBM Z System Automation.
SA z/OS - IBM System Automation: Planning, Installation, and Customization
3 The SA z/OS - IBM System Automation: Planning, Installation, and Customization course, takes the user through the steps required to install, and configure SA z/OS V4.2 onto their system. Initial content covers implementation considerations, and provides the learner with tools used in the planning and installation process. The configuration assistant section describes how some of these implementation tasks can be automated. The Customization Dialog module describes how this product is used to build an SA z/OS automation policy database. It guides the learner through the creation of database entries, to the compilation of the Systems Operations Configuration File, enabling it for distribution and use by an automated system.
SA z/OS – IBM System Automation: Operations
3 The SA z/OS - IBM System Automation: Operations course, focuses on the SA z/OS administration and monitoring tasks performed by operations and administrator personnel. Initial content looks at initializing SA z/OS, and describes start-up options that can be invoked for the automation manager and automation agent. Tasks that allow you to refresh automation configuration data, and enable automation through the use of automation flags, pacing gates and runmodes is also discussed. SA z/OS functionality that may unintentionally inhibit automation activity, and how these issues are resolved is also covered.
SA z/OS - Automation Definitions Introduction and Workshop
3 The SA z/OS - Automation Definitions Introduction and Workshop course, begins by describing the key Entry Types that can be defined in an SA z/OS policy database, and their purpose. Following this, a workshop-style module provides you with hands-on exercises used to create an application, application group and related automation definitions.
SA z/OS - Advanced Automation and Reporting
4 The SA z/OS - Advanced Automation and Reporting course, introduces the learner to some more advanced implementation and configuration possibilities focusing on end-to-end automation, and the automation of CICS, IMS, and Db2 environments. It also looks at various methods used to report on the policy database content, automation activity, and statistics produced by SMF relating to automation usage.
  »  IMS (Information Management System)
Course Title Duration Description
IMS v15 Series
IMS 15 Introduction
5 The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts.
IMS 15 Commands
4 The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided.
IMS 15 Databases
4 The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations.
IMS 15 Transaction Manager for Programmers
4 This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use.
  »  Java Programming
Course Title Duration Description
Java on z/OS Series
Java on z/OS for Java Programmers
1 This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere.
Java For COBOL Programmers Series
Java Introduction for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment.
Java Programming for the IBM Enterprise
7 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent.
Java Data Access for the IBM Enterprise
3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems.
  »  JCL (Job Control Language)
Course Title Duration
(hours)
Description
Job Control Language (JCL) 3.1 Series
JCL (z/OS) - Introduction to JCL 3.1
3 The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.
JCL (z/OS) – JCL Coding Basics – JOB and EXEC Statements 3.1
4 This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.
JCL (z/OS) – JCL Coding Basics – DD Statements and Data Sets 3.1
4 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones.
JCL (z/OS) – JCL Coding Basics – DD Statements and SYSOUT 3.1
3 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course looks at the coding for printed output and job SYSOUT.
JCL (z/OS) – Advanced JCL Data Set Use 3.1
5 The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.
JCL (z/OS) – Controlling Job and Step Processing 3.1
3 While JCL is generally rigid in the way that it runs programs and related jobs, in recent years there have been several advancements in code that can be used to conditionally run steps, and schedule jobs. This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.
JCL (z/OS) – Working with Procedures and Symbols 3.1
3 Previous courses have described many of the statements and parameters to build a basic job. This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.
JCL (z/OS) – Running and Debugging JCL 3.1
3 In previous JCL courses you have been presented with many examples of the types of errors that can be produced when running your JCL. This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.
JCL (z/OS) – Advanced – Tips and Tricks 3.1
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with various z/OS releases, and provides details on statements and parameters that have evolved over the last few years.
Job Control Language (JCL) 2.5 Series
JCL (z/OS) - Introduction to JCL 2.5
3 The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.
JCL (z/OS) – JCL Coding Basics – JOB and EXEC Statements 2.5
4 This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.
JCL (z/OS) – JCL Coding Basics – DD Statements and Data Sets 2.5
4 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones.
JCL (z/OS) – JCL Coding Basics – DD Statements and SYSOUT 2.5
3 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course looks at the coding for printed output and job SYSOUT.
JCL (z/OS) – Advanced JCL Data Set Use 2.5
5 The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.
JCL (z/OS) – Controlling Job and Step Processing 2.5
3 While JCL is generally rigid in the way that it runs programs and related jobs, in recent years there have been several advancements in code that can be used to conditionally run steps, and schedule jobs. This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.
JCL (z/OS) – Working with Procedures and Symbols 2.5
3 Previous courses have described many of the statements and parameters to build a basic job. This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.
JCL (z/OS) – Running and Debugging JCL 2.5
3 In previous JCL courses you have been presented with many examples of the types of errors that can be produced when running your JCL. This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.
JCL (z/OS) – Advanced – Tips and Tricks 2.5
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with various z/OS releases, and provides details on statements and parameters that have evolved over the last few years.
  »  JES 2.5 (Job Entry Subsystem)
Course Title Duration Description
JES2 Console Simulations 2.5 Series
JES2 – Basics 2.5
3 This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology.
JES2 – Understanding JES2 Processing 2.5
4 This course describes how JES2 devices are used, their possible statuses, and how batch jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes.
JES2 – Using JES2 Commands 2.5
3 This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status.
JES2 – Monitoring Jobs, Initiators, and Printers Using JES2 Commands 2.5
3 This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status.
JES2 – Managing Batch Processing in a JES2 Environment 2.5
5 This course builds from previous training, describing commonly used JES2 commands used to manage and schedule batch job activity. It also introduces JES2 networking capabilities, describing how batch jobs can be scheduled for processing on other mainframe sites within the organization.
JES2 – Controlling JES2 Initiators and Printers 2.5
3 This course discusses the manipulation of JES2 initiator and printer resources that are associated with job, and job output, processing.
JES2 – Resolving Network and Spool Space Problems 2.5
3 This course provides you with examples of common JES2 batch job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues.
JES2 – Managing JES2 Checkpoints 2.5
4 This course provides detailed information relating to the function and use of JES2 checkpoints; their placement, and attributes, along with steps required to resolve problems associated with this resource.
JES2 – Identifying and Resolving JES2 System Problems 2.5
5 This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully.
JES2 – Advanced – Tips and Tricks 2.5
.5 This course contains many JES2-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent z/OS releases.
JES2 – Command Simulations 2.5
.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources.
Course Title Duration Description
Linux Series
Introduction to Linux
5 The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed.
The Linux File System
5 The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed.
Editing with VI
4 The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided.
Linux Shell Programming
4 The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors.
Linux Operations
4 The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization.
Linux on z Systems Series
Linux on IBM Z Fundamentals
5 The Linux on IBM Z Fundamentals course discusses available Linux distributions for the IBM Z environment, its operational implementation, and the general monitoring and management of Linux. The final module provides an overview of the performance monitoring and management tasks performed by the Linux Administrator, and contains tips for best practice in these areas.
  »  Mainframe Application Performance Curriculum
Course Title Duration
(Hours)
Description
Mainframe Application Performance Series
Introduction to Sampling Performance Tools 1 This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions.
Mainframe Application Performance Tuning 1 A general introduction to mainframe application performance. In this course, you will be introduced to the basic concepts of improving application performance by tuning. This course includes suggestions on when and why to tune, tuning for CPU vs service time, and also considers batch and online performance objectives.
  »  Managed File Transfer Curriculum
Course Title Duration
(Hours)
Description
Managed File Transfer Series
Managed File Transfer for Operations
3 This course describes how file transfer requirements have grown in importance over the years to the point where it has become an integral part of the daily workload processing. It then focuses on the elements of file transfer covering security aspects such as encryption and hashing algorithms as well as discussing the pros and cons of popular file transfer protocols. This knowledge is paramount when needing to manage and monitor a file transfer environment. The final part of this course discusses the common features associated with general Managed File Transfer (MFT) products, looking at tasks that need to be undertaken to ensure that compliance, internal regulations and SLAs are met, and that data integrity and security is maintained.
  »  Parallel Sysplex Curriculum 2.5
Course Title Duration
(Hours)
Description
Parallel Sysplex z/OS 2.5 Series
Parallel Sysplex - Fundamentals 2.5
3 This course begins by describing how the Parallel Sysplex evolved and why it is integral component of today's enterprise IT environment. Its key features are discussed in terms of the benefits it provides to the organization - system availability, data integrity, workload and data sharing, and automated recovery to name a few. A break-down of the major Parallel Sysplex components is then presented, describing their importance and how they can be configured.
  »  PL/1 Programming
Course Title Duration Description
PL/1 Programming Series
PL/1 Fundamentals and Data Representation
5 The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language.
PL/1 Program Design Techniques
5 The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions.
PL/1 Accessing Data in Files
5 The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions.
PL/1 Preprocessor, Debugging and Advanced Coding
5 The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language.
  »  Python Programming
Course Title Duration
(Hours)
Description
Python Programming on z/OS Series
Python – Python on z/OS Fundamentals
1 This course provides the user with a broad overview of Python programming in the z/OS environment, covering the installation of Python and its prerequisites, as well as the construction and execution of Python scripts using the z/OS UNIX Shell and the BPXBATCH utility. Additionally, students will learn about various encoding options for Python files and how to tag files appropriately. Furthermore, the course provides an overview of the packages included with IBM Python, as well as suggestions for other useful packages that can be implemented.
  »  Quantum Computing
Course Title Duration
(Hours)
Description
Quantum Computing Expert Video Series
Quantum – Easy Introduction to Quantum Computing – Expert Videos
.75 In this expert video, Quantum computing is explored from its inception to its current state and future possibilities. The presenter delves into the specifics of what Quantum computing is and clears up common misconceptions about its purpose. The video also provides an overview of the prominent hardware and software providers in the Quantum computing space and highlights their current offerings. Additionally, the video showcases various practical applications of Quantum computing, which helps to explain the hype surrounding this exciting technology.
Quantum – Installing Qiskit on IBM LinuxONE – Expert Videos
.75 This expert video delves deeper into the capabilities of Qiskit, an open-source quantum computing software development kit. The instructor provides an in-depth explanation of its functionality before demonstrating the process of downloading and installing Qiskit onto a LinuxONE server. This is done in order to prepare for the execution of a quantum program within the IBM Quantum environment.
Quantum Computing Series
Quantum – Quantum Computing and Qiskit
5 This course begins by looking back through history to see how calculation has evolved, and the advancements in technology and tools, which have lead us to where we are today – quantum computing. You will then see how Qiskit is used for working with quantum computers, how it is installed, and the process of connecting it to a backend simulator or real quantum computer. You will also look at the Qiskit community and how you can contribute to Qiskit’s open source code. Finally, you will discover how algorithms have evolved and the role quantum algorithms will play in the future.
  »  REXX (REstructured eXtended eXecutor language)
Course Title Duration Description
REXX Programming Series
REXX – Fundamentals
4 This course introduces you to REXX, describing why it is still popular today and the myriad of resources that are available to help build your skills and knowledge. It also looks at the main features of REXX and how coding in this language can benefit various job roles within the organization. Before diving into the actual REXX code, an overview of REXX programming editors is provided to assist you in identifying appropriate work tools for use with this programming language.
REXX – Coding and Execution Basics
4 In this course you will discover that REXX has simple syntax and coding requirements compared to many other programming languages. You will look at the general structure of a REXX program concentrating on the types of data that can be coded. This is then wrapped around best practices, using your organization’s standards and general programming rules. Finally, you will see where and how REXX program code is stored, and the different ways it can be invoked.
REXX – General REXX Instructions
3 In this course you will begin by seeing how simple arithmetic calculations are performed using REXX, and then progress to more powerful complex calculations. You will see how a simple REXX conversational program is built, and how data passed to a REXX program can be parsed to create variables. The value and use of compound variables is also examined.
REXX - Basic REXX Functions and Subroutines
4 In this course you will see how functions and routines can be used to perform complex tasks quickly. You will then branch off to look at some of the more straightforward built-in functions provided by REXX. Scenarios are presented to provide you with ideas on how arithmetic and comparison built-in functions can be used.
REXX - Manipulating and Converting Data
4 This course looks at the built-in REXX functions that can be used format, and manipulate strings of data, as well as date and time formats. Details on converting data to and from Hexadecimal, Decimal, Binary and Character formats is also discussed. Scenarios are presented to provide you with ideas on how these built-in functions can be used.
REXX - Program Flow
3 In this course you will see how the normal sequential flow of a REXX program can be altered so that code is skipped, or repeated. Instructions used to evaluate and act on a value if it is true, are discussed, while details on methods used to loop instructions are explained in depth.
REXX - Handling Errors
3 When creating any program, you need to cater for when the inevitable errors occur. In this course you will look at handling errors from two perspectives. Firstly, you will see the type of code required to branch to an error routine that will perform actions that will – help with diagnosing the problem, clean up certain activity that has occurred, and end the program. Performing diagnostics on errors that have occurred to determine the problem is also covered in depth, highlighting utilities and code used to assist with this task.
  »  SDSF 2.5 (System Display & Search Facility)
Course Title Duration Description
System Display and Search Facility (SDSF) 2.5 Series
SDSF – Introduction and Basic Concepts 2.5
3 The SDSF – Introduction and Basic Concepts course describes the purpose of SDSF, providing details on how SDSF is accessed and how you interact with it.
SDSF – Working with SDSF Data 2.5
4 The SDSF – Working with SDSF Data course explains how data is located in SDSF screens and the use of filtering commands to display specific information. A description of SDSF logs and how they are used is also presented.
SDSF – Operations 2.5
3 The SDSF – Operations course discusses how SDSF is configured and initialized. It looks at the commands used to start and stop SDSF servers and the use of the MODIFY command to update server attributes and invoke tracing and debug facilities.
SDSF – Job Activity Basics 2.5
3 The SDSF – Job Activity Basics course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands.
SDSF – Controlling and Managing Jobs 2.5
3 The SDSF – Controlling and Managing Jobs course describes how a submitted job uses its job class to determine the type of initiator that will select it, and shows how job class attributes can be modified. SDSF actions used to start, hold, and terminate batch jobs and started tasks, is also presented.
SDSF – Advanced Job Management and Monitoring 2.5
3 The SDSF – Advanced Job Management and Monitoring course describes how the SDSF MAS panel is used to display MAS member status and attributes. Commands used to display MAS member and JES2 statistics are presented as well as commands used to control MAS member activity. Various SDSF panels, used to obtain in-depth job analysis information, are examined, describing how they can be used to determine performance or aid in job resolution.
SDSF – Using SDSF to Display and Control Job Output 2.5
3 The SDSF – Using SDSF to Display and Control Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether.
SDSF – Using SDSF to Display and Control Printers 2.5
3 The SDSF – Using SDSF to Display and Control Printers course shows how to display and modify printer attributes and manipulate printer activity.
SDSF – System Health and Managing JES2 Resources 2.5
3 The SDSF – System Health and Managing JES2 Resources course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages.
SDSF – Using SDSF to Work with System Information and Devices 2.5
4 The SDSF – Using SDSF to Work with System Information and Devices course describes how to display the contents of spool volumes, and manage spool volume availability. It explains how a spool offload is performed when data needs to be moved from spool devices. Tasks associated with displaying and managing JES2 nodes and lines is presented, and the process of obtaining a wide range of system information and defaults is also covered.
SDSF – Using SDSF to Perform Advanced System Monitoring 2.5
3 The SDSF – Using SDSF to Perform Advanced System Monitoring course describes SDSF panels that system programmers can use to analyze storage and address memory information. It also discusses how key system libraries and their attributes can be displayed using various SDSF panels. This information can assist systems programmers with analyzing and diagnosing information that may be affecting the performance of workloads and availability of the system.
SDSF – Advanced – Tips and Tricks 2.5
1 This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS.
  »  Security Curriculum 2.5
Course Title Duration Description
Introduction to Mainframe Security Series 2.5
Security – Introduction to Mainframe Security z/OS 2.5
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
RACF for z/OS v2.5 Series
RACF – Introduction 2.5
3 This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.
RACF – Defining and Managing Users in RACF 2.5
4 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Defining and Managing Users in RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Protecting Data Sets Using RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF – Protecting Data Sets Using RACF 2.5
3 This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
RACF - Managing Digital Certificates 2.5
3 In this course you will see how encryption keys are used to securely manage data, and the standards that enforce encryption protocols. You will be introduced to various types of certificates and see how data that is stored in them. From a z/OS perspective you will see how IBM’s Digital Certificate Access Server (DCAS) provides password free access to that environment using a certificate. Commands used to generate and manipulate digital certificates, and key rings is discussed in detail.
RACF and z/OS UNIX 2.5
3 This course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
RACF – For System Programmers 2.5
3 This course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.
RACF – For Auditors 2.5
4 This course describes the various types of data center audits and discusses the role of an internal auditor when performing a RACF audit. It expands this to look at the general steps to ensure that RACF managed security is aligned with both organizational security standards, and external compliance regulations. RACF auditor privileges are discussed in detail describing how audit information is stored and the commands used to request the capture of specific events. The type of data that can be unloaded from SMF, and the RACF database, is explained along with details on how ICETOOL can be used to process this information to create audit reports.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
  »  Service Oriented Architecture
Course Title Duration Description
Service Oriented Architecture Series
Service Oriented Architecture 4 This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption.
  »  TSO/ISPF 2.5 (Time Sharing Option & Interactive Systems Productivity Facility)
Course Title Duration
(hours)
Description
TSO/ISPF 2.5 Series
ISPF (z/OS) – TSO and ISPF Basics 2.5
3 The TSO and ISPF Basics course explains the purpose of TSO and ISPF, and describes how each of these products is accessed. Common TSO commands are presented, providing scenarios where they are used. ISPF screen navigation using commands, and the ISPF Action Bar, are also discussed.
ISPF (z/OS) – Configuring ISPF for General Use 2.5
3 The Configuring ISPF for General Use course explains how ISPF product defaults are displayed, and how they can be modified to suit the user’s requirements. The use of function keys is discussed as well as the methods used to create, and navigate to, multiple logical ISPF screens.
ISPF (z/OS) – Managing Data Files and Definitions with ISPF/PDF 2.5
5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects.
ISPF (z/OS) – Displaying and Manipulating Data in View and Edit Mode 2.5
3 The Displaying and Manipulating Data in View and Edit Mode course explains how to access a data set in View and Edit mode, and explains the difference between these modes. It then describes how to scroll and navigate in Edit mode, and introduces the common edit line commands.
ISPF (z/OS) – Using Edit Primary Commands 2.5
3 The Using Edit Primary Commands course describes the commands used to display and update data in ISPF edit mode. This function allows you to perform multiple changes to all, or part of the data, being edited. This course also discusses how data from an edit session can be saved, exited without saving, and copied to another data set or partitioned data set member.
ISPF (z/OS) – Advanced ISPF Data Editing Techniques 2.5
3 The Advanced ISPF Data Editing Techniques course describes how various tabbing facilities can be used in an ISPF edit session to automatically place the cursor in specific columns, allowing for easier bulk data entry. It also discusses how boundaries can be defined to the data being edited and looks at edit data profile attributes, and how they can be updated.
ISPF (z/OS) – Advanced – Tips and Tricks – TSO 2.5
2.5 This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with recent versions of z/OS.
  »  Utilities
Course Title Duration Description
z/OS Batch Utilities 3.1 Series
Utilities – General Data Set Utilities 3.1
4 This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Copy, Compare, and List Data Utilities 3.1
3 Operators, application and system programmers who have a need to code and execute batch utilities that are used for manipulating data set content.
Utilities – Sort and Update Data Utilities 3.1
3 This course looks IEBUPDTE and DFSORT utilities and provides real-life examples describing how they are used to modify and sort data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Advanced – Tips and Tricks 3.1
1.5 This course contains many Utility-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with latest z/OS releases.
z/OS Batch Utilities 2.5 Series
Utilities – General Data Set Utilities 2.5
4 This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Copy, Compare, and List Data Utilities 2.5
3 Operators, application and system programmers who have a need to code and execute batch utilities that are used for manipulating data set content.
Utilities – Sort and Update Data Utilities 2.5
3 This course looks IEBUPDTE and DFSORT utilities and provides real-life examples describing how they are used to modify and sort data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Advanced – Tips and Tricks 2.5
1.5 This course contains many Utility-related tips, tricks, techniques and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with latest z/OS releases.
  »  VSAM 2.5
Course Title Duration Description
VSAM z/OS 2.5 Series
Introduction to VSAM 2.5
6 This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors.
VSAM – Defining, Altering, and Deleting VSAM Data Sets z/OS 2.5
3 This course describes how VSAM data sets are created using the IDCAMS Utility, or by using JCL statements. It also discusses how alternate indexes on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced – both from IBM and other vendors.
VSAM – Working with VSAM Data Sets z/OS 2.5
3 This course discusses various methods for displaying, and printing all, or partial, data from a VSAM data set. It also describes how IDCAMS can be used to copy VSAM data and introduces several other products used to manage VSAM data sets.
VSAM - Managing VSAM Data 2.5
3 This course explains how VSAM data can be configured, allowing it to be shared by jobs, TSO users, UNIX processes and started tasks. It also addresses recovery options available when VSAM data is shared. A detailed explanation of parameters affecting VSAM performance is covered as well as the types of utilities used to capture VSAM performance statistics.
VSAM – Advanced - Tips and Tricks 2.5
.5 This course contains many IDCAMS utility tips, tricks, techniques, and best-practice items associated with VSAM data.
  »  Virtualization (z/VM 7.3)
Course Title Duration Description
z/VM 7.3 Series
z/VM – Introduction and Concepts z/VM 7.3
3 The z/VM – Introduction and Concepts course describes how virtualization, and in particular z/VM, has become more popular in Data Centers. It explains the benefits of virtualization and some of its challenges, and describes how virtualization is used in the cloud. Content then focuses on z/VM describing how this operating system supports virtualization.
z/VM – System Initialization and Shutdown z/VM 7.3
4 The z/VM – System Initialization and Shutdown course examines the processes used for z/VM start-up and shutdown.
z/VM – Monitoring and Controlling z/VM Operations z/VM 7.3
5 The z/VM – Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources.
z/VM – Managing Guest Operating Systems z/VM 7.3
4 The z/VM – Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM. This includes the Conversational Monitor System (CMS), which is the default guest operating system that comes with z/VM. You will also look at the commands used to IPL, pause, restart, and shut down a guest operating system, and how to IPL the system automatically and manually.
z/VM – Managing CMS Files z/VM 7.3
4 The z/VM – Managing CMS Files course describes how to create lists of CMS files from which you can delete and rename files, and copy and compare their contents. You will also see how CMS files can be sent to other users, and how they are saved on the user’s disk after transmission. You will also see how the XEDIT utility can be used to add data to a CMS file.
z/VM – Identifying and Resolving z/VM Problems z/VM 7.3
5 The z/VM – Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also discussed.
  »  WebSphere Curriculum
Course Title Duration Description
Java and WebSphere Application Server Series
WebSphere - Introduction to Java and WebSphere Application Server
3 This course introduces Java, one of the most popular programming languages in modern IT and its extended version, Jakarta Enterprise Edition (Jakarta EE), which itself is another popular version of Java that has found its place supporting and running back-end enterprise applications. The course also introduces IBM’s WebSphere Server Application and how it serves in implementing Java/Jakarta EE services within an enterprise IT environment.
WebSphere - Introduction to Java and WebSphere Application Server on z/OS
4 In this course you are introduced to how Java works in a z/OS environment and some of the tools available. The course then introduces you to WebSphere Application Server for z/OS and WebSphere Application Server for z/OS Liberty and their key features. The course then looks deeper into how WebSphere Application Server for z/OS and its Liberty variant interact and work with z/OS resources.
WebSphere Application Server Liberty on z/OS Series
WebSphere – WebSphere Application Server Liberty on z/OS Administration
3 In this course you will look at the commands used to create, start, and stop a WAS Liberty server, and to display its status. You will also see how a WAS Liberty server, and its environment, are configured using various files – through parameter definitions, and by enabling features. The role of the Angel server is discussed along with commands used to manage it. Details on z/OS MODIFY commands that can be used to interact with WAS Liberty server are presented, and you will also be introduced to a number of different interfaces that can communicate with a WAS Liberty server. Information on the types of messages logged, and their location is also shown.
Course Title Duration
(hours)
Description
z/OS Series 3.1
z/OS – Concepts 3.1
7 The z/OS Concepts course describes the evolution of mainframe enterprise computing and provides descriptions of the major components that comprise today’s z/OS environment.
z/OS – Managing and Processing z/OS Data 3.1
4 The Managing and Processing z/OS Data course describes how I/O, which is the reading and writing to external devices such as disks, tape, printers, and networks, is performed in a z/OS environment. It then discusses the various z/OS-related resources that can be shared and the role of workload management in prioritizing workloads.
z/OS – Initializing and Terminating the z/OS System 3.1
4 The z/OS – Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system start-up and shutdown, describing the most common commands and operator responses.
z/OS – Displaying z/OS System Activity 3.1
4 This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices.
z/OS – Advanced z/OS Monitoring Facilities 3.1
4 This course provides an overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS as well as a description on how SMF data is created and managed. This course also discusses the need for message suppression and describes how this is achieved.
z/OS – Identifying z/OS System Problems 3.1
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.
z/OS – Removing Tasks from the z/OS System 3.1
3 This course describes the processes and commands required to remove tasks, users, and batch jobs from a z/OS system.
z/OS – Techniques for Handling General z/OS Problems 3.1
3 This course introduces several techniques and processes used to assist with resolving z/OS system problems.
z/OS – Advanced – Tips and Tricks 3.1
2 This course contains many z/OS-related tips, tricks, techniques, and best practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.5 and z/OS 3.1.
z/Architecture Series 3.1
z/Architecture – Processing Workloads 3.1
5 The z/OS Architecture – Processing Workloads course describes how today’s z/OS system processes workloads, focusing on the concepts of address spaces showing how they provide the environment under which tasks can run. You will look at the different types of CPUs that can be configured in a z/OS system and see how programs issue instructions to the CPU. Diving down deeper you will then look at the CPU chips themselves and view the components that comprise them, looking at their involvement in processing work. Finally, the major components that comprise the mainframe’s I/O structure are presented to show how work moves throughout the z/OS environment.
z/Architecture – Memory, Address Spaces, and Virtual Storage 3.1
3 Processor storage, real storage, or central storage. Whatever you call it, it is the memory where z/OS programs and their data need to reside before they can be processed, and like other mainframe resources it can be virtualized. In this z/OS Architecture – Memory, Address Spaces and Virtual Storage course, you will see how the address spaces discussed in the previous course, access and free the memory they require to process work. You will also see how virtualization of this resource occurs, which for IT specialists will provide them with knowledge to troubleshoot memory-related issues.
z/OS Console Simulations Series 3.1
z/OS – MVS Command Simulations 3.1
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS – System Shutdown and IPL Simulations 3.1
3.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shut-down and start-up of a z/OS system.
Installing and Managing z/OS 3.1 Software Series
SMP/E – Introduction to SMP/E 3.1
3 Ensuring that all of your organization’s z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software.
z/OS Series
z/OS – Concepts 2.5
7 The z/OS Concepts course describes the evolution of mainframe enterprise computing and provides descriptions of the major components that comprise today’s z/OS environment.
z/OS – Managing and Processing z/OS Data 2.5
4 The Managing and Processing z/OS Data course describes how I/O, which is the reading and writing to external devices such as disks, tape, printers, and networks, is performed in a z/OS environment. It then discusses the various z/OS-related resources that can be shared and the role of workload management in prioritizing workloads.
z/OS – Initializing and Terminating the z/OS System 2.5
4 The z/OS – Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system start-up and shutdown, describing the most common commands and operator responses.
z/OS – Displaying z/OS System Activity 2.5
4 This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices.
z/OS – Advanced z/OS Monitoring Facilities 2.5
4 This course provides an overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS as well as a description on how SMF data is created and managed. This course also discusses the need for message suppression and describes how this is achieved.
z/OS – Identifying z/OS System Problems 2.5
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.
z/OS – Removing Tasks from the z/OS System 2.5
3 This course describes the processes and commands required to remove tasks, users, and batch jobs from a z/OS system.
z/OS – Techniques for Handling General z/OS Problems 2.5
3 This course introduces several techniques and processes used to assist with resolving z/OS system problems.
z/OS – Advanced – Tips and Tricks 2.5
2 This course contains many z/OS-related tips, tricks, techniques, and best practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.4 and z/OS 2.5.
z/Architecture Series
z/Architecture – Processing Workloads 2.5
5 The z/OS Architecture – Processing Workloads course describes how today’s z/OS system processes workloads, focusing on the concepts of address spaces showing how they provide the environment under which tasks can run. You will look at the different types of CPUs that can be configured in a z/OS system and see how programs issue instructions to the CPU. Diving down deeper you will then look at the CPU chips themselves and view the components that comprise them, looking at their involvement in processing work. Finally, the major components that comprise the mainframe’s I/O structure are presented to show how work moves throughout the z/OS environment.
z/Architecture – Memory, Address Spaces, and Virtual Storage 2.5
3 Processor storage, real storage, or central storage. Whatever you call it, it is the memory where z/OS programs and their data need to reside before they can be processed, and like other mainframe resources it can be virtualized. In this z/OS Architecture – Memory, Address Spaces and Virtual Storage course, you will see how the address spaces discussed in the previous course, access and free the memory they require to process work. You will also see how virtualization of this resource occurs, which for IT specialists will provide them with knowledge to troubleshoot memory-related issues.
z/OS Console Simulations Series
z/OS – MVS Command Simulations 2.5
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS – System Shutdown and IPL Simulations 2.5
3.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shut-down and start-up of a z/OS system.
Installing and Managing z/OS 2.5 Software Series
SMP/E – Introduction to SMP/E 2.5
3 Ensuring that all of your organization’s z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software.
  »  z/OS Connect for z/OS 2.5
Course Title Duration Description
z/OS Connect 3.0 Series
z/OS Connect – IBM z/OS Connect 3.0
5 The IBM z/OS Connect Version 3.0 course discusses the importance of organizations taking advantage of opening up their mainframe data to cloud, mobile, and web customers through the use of RESTful APIs, and describes how z/OS Connect provides this capability. The course also covers what IT specialists need to know on how resource access and data communication is performed by z/OS Connect including the different aspects of z/OS Connect OpenAPI 2 and z/OS Connect OpenAPI 3 and how each can be used.
  »  z/OS Management Facility for z/OS 2.5
Course Title Duration Description
z/OS Management Facility z/OS 2.5 Series
z/OSMF – Introduction and Basics z/OS 2.5 1 This course provides the learner with an introduction to the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it.
z/OSMF – Working with z/OSMF Tasks z/OS 2.5 4 This course provides the student with the skills needed to use some of the major z/OSMF features: problem management, workflow creation, software management and deployment, and cloud provisioning.
z/OSMF – Configuring and Administering z/OSMF z/OS 2.5 3 This course outlines how z/OS tasks such as the configuration of workload management, and network configuration can be performed using z/OSMF. It also explains how performance monitoring, and management of processor capacity tasks, can be performed within z/OSMF.
  »  z/OS UNIX System Services 2.5
Course Title Duration Description
z/OS UNIX Systems Services 2.5 Series
z/OS UNIX - z/OS UNIX System Services Basics 2.5
3 This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used.
z/OS UNIX - Interacting with the z/OS UNIX System 2.5
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
z/OS UNIX - Working with z/OS UNIX 2.5
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
  »  Zowe Curriculum
Course Title Duration
(hours)
Description
Zowe Foundations Series
Zowe Foundations
3 The Zowe Foundations course begins by describing the features of Zowe, and the major components that comprise this product: Zowe Application Framework, Zowe Command Line Interface (CLI), Zowe Explorer, Zowe Desktop, and API Mediation. Examples show how users interact with these Zowe components and the advantages of using them. The course then dives into more detailed information, describing how Zowe and its components are started and run, describing any prerequisites that are required. The default capabilities of each component is presented as well as methods that can be used to create or import additional functionality. The final module in this course looks at the installation and customization possibilities when dealing with Zowe server and client components.


Search our catalog