Db2 12 for z/OS Introduction to System Administration (CV853G)

Overview

This course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system.

Audience

This course is intended for z/OS system administrators, database administrators, or other technical individuals who will be managing Db2 12 for z/OS.

Prerequisites

  • Understanding of the objects (such as databases, table spaces, tables, indexes, and so forth) used in a Db2 subsystem
  • Basic knowledge of SQL
  • At least one year as a z/OS systems programmer or equivalent knowledge

OR

  • At least one year as a Db2 for z/OS Database Administrator

Objective

After completing this course, students should be able to:

  • Start and stop a Db2 subsystem
  • Use the SET SYSPARM command
  • Access the system log to gather information about the subsystem initialization, operation, or shutdown
  • Describe the components and address space structure of a Db2 subsystem
  • Explain the use of RACF (or another external security program) for Db2 connection security
  • Explain the use of Roles and Trusted Contexts
  • Implement security procredures for a Db2 subsystem
  • Explain Db2 program flow for all environments
  • Explain parameter setting for the IRLM
  • Invoke and utilitze Db2 TSO facilities
  • Use the Db2 Catalog to monitor subsystem authorizations
  • Work with the Active Log data sets
  • Explain Db2 logging
  • Use SET LOG SUSPEND and SET LOG RESUME
  • Use DSNJU004 to print log map and interpret the results
  • Use DSNJU003 to rename Db2 data sets
  • Plan for recovery of a BSDS failure
  • Monitor and control a Db2 subsystem
  • Explain transaction flow in IMS and CICS environments (optional)
  • Describe the CICS and DB2 environment (optional)
  • Explain the difference between JDBC and SQLJ
  • And much more
Show details

Course Outline

After completing this course, students should be able to:

  • Start and stop a Db2 subsystem
  • Use the SET SYSPARM command
  • Access the system log to gather information about the subsystem initialization, operation, or shutdown
  • Describe the components and address space structure of a Db2 subsystem
  • Explain the use of RACF (or another external security program) for Db2 connection security
  • Explain the use of Roles and Trusted Contexts
  • Implement security procredures for a Db2 subsystem
  • Explain Db2 program flow for all environments
  • Explain parameter setting for the IRLM
  • Invoke and utilitze Db2 TSO facilities
  • Use the Db2 Catalog to monitor subsystem authorizations
  • Work with the Active Log data sets
  • Explain Db2 logging
  • Use SET LOG SUSPEND and SET LOG RESUME
  • Use DSNJU004 to print log map and interpret the results
  • Use DSNJU003 to rename Db2 data sets
  • Plan for recovery of a BSDS failure
  • Monitor and control a Db2 subsystem
  • Explain transaction flow in IMS and CICS environments (optional)
  • Describe the CICS and DB2 environment (optional)
  • Explain the difference between JDBC and SQLJ
  • And much more