Interskill Learning Mainframe Training

Brazilian Portuguese French German Italian Russian Spanish (European) Spanish (Latin American)
+44 (0) 1625 441120

The Online Mainframe Training Specialists
Search   Course Catalogue   Live Chat!  

Course Catalogue


Below is a complete list of all courses grouped by curriculum. All courses are self-paced and can be taken at anytime and in any order. There are no schedules and you may take courses multiple times within your contract period. Courses and assessments are accessed by students online 24/7 via our dedicated training platform, MyInterskill. In addition to these courses, we also offer assessments, Learning Plans and guidance by one of our Learning Consultants. The entire package of courses, assessments and learning plans is offered as a bundle for one low price per student. We do not sell individual courses. Be sure to check out our coming soon courses and recently released courses, which are also included with your purchase.


IMPORTANT NOTICE: Courses marked with "★" are scheduled to be retired as new releases become available and are only available to enrol in on request. Click here for full details on course retirements.


Mainframe Subject Areas

  »   Assembler
Course Title Duration Description
Assembler Introduction
5 The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability.
Assembler Instructions
7 The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed.
Assembler Macros
5 The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use.
Assembler Programming
8 The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilise access registers to address data spaces. This course also looks at the interpretation of program listings.
Assembler z/OS Advanced
5 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
Assembler Cross Memory Services
4 The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution.
  »   Blockchain
Course Title Duration Description
Blockchain Fundamentals
4 The Blockchain Fundamentals course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network.
Course Title Duration Description
CONTROL-M Series
Introduction to CONTROL-M for z/OS 3 The Introduction to Control-M for z/OS course begins by describing the need for workload scheduling, introducing BMC Control-M for z/OS and describing its general function. It then looks at how this product is accessed using a traditional 3270 interface, as well as the Control-M EM GUI.
Defining and Scheduling Jobs Using Control-M for z/OS 4 The Defining and Scheduling Jobs Using Control-M for z/OS course works through the process of creating definitions used to schedule jobs. It begins by introducing the concept of calendars, and describing how various types of calendars can be created. It then jumps to the actual job definition, describing how it can be used to provide diverse scheduling requirements. Automated actions performed following job completion are also discussed. The final module delves into the use of system and user-defined variables and describes how they can be used to dynamically modify JCL submitted from a Control-M job definition.
Monitoring and Managing Job Processing 4 The Monitoring and Managing Job Processing course describes how jobs are monitored using the Active Environment screen, looking at job statuses and commands used to manipulate jobs. It then turns to the monitoring and management of other Control-M components, including the log, conditions, and control and quantitative resources. In the final module, an overview of the utilities that run automatically, and those that can be invoked manually, are discussed, as well as the types of reports that can be run, are covered.
  »   C Programming
Course Title Duration Description
C/C++ on z/OS for C Programmers 1 This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment.
  »   CA Technologies
8:17 PM 3/1/2019
Course Title Duration Description
CA 1 Series
CA 1® Tape Management - Using Tape Media 5 The CA 1® Tape Management - Using Tape Media course describes the use of the CA 1® Tape Management system, the online facility and its uses, and the standard daily maintenance processing required by CA 1.
CA 1® Tape Management - Identifying and Resolving Media Problems 5 The CA 1® Tape Management - Identifying and Resolving Media Problems course describes the structure of the CA 1 Tape Management system, its chaining process, AIVS and tape stacking facilities, problem determination, and the utilities available for correcting structural problems and reporting.
CA OPS/MVS Series
CA OPS/MVS - Event Management and Automation - Overview, Components and Features 5 The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided.
CA OPS/MVS - Event Management and Automation - Rules and OPS/REXX 5 The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided.
CA OPS/MVS - Event Management and Automation - Automating Events Using the Relational Data Framework 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation.
CA OPS/MVS - Event Management and Automation - Automating Events Using the System State Manager (SSM) 5 The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed.
CA OPS/MVS - Event Management and Automation - Schedule and Group Managers for Event Management 4 The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed.
CA 7 Workload Automation Series
Introduction to CA Workload Automation - CA 7® Edition 4 This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions.
CA 7 Workload Automation - Scheduling Batch Processing 6 This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7.
CA 7 Workload Automation - Monitoring and Maintaining the Batch Processing Environment 6 This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes.
CA 7 Workload Automation - System Programmer Interaction with CA 7 4 This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting.
CA 7 Workload Automation - Backup, Recovery and Problem Resolution 5 This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided.
CA 11 Workload Automation Series
CA Workload Automation Restart Option for z/OS Schedulers Overview 4 The Workload Automation Restart Option for z/OS Schedulers Overview course introduces the components, functions, and capabilities of CA 11, and describes how job information is stored and processed by this product.
Managing CA Workload Automation Restart Option for z/OS Schedulers 4 This course looks at the interaction that users have with CA 11 in order to determine the status and attributes of job information stored in the CA 11 database. It also identifies how CA 11 data can be used for generating reports. Common online commands and batch generation programs are discussed in detail, while the last module focuses on possible CA 11 problems and resolution and includes an overview of backup and recovery strategies associated with CA 11.
CA Endevor Change Manager Series
CA Endevor™ Software Change Manager Introduction and Basic Usage 6 The CA Endevor™ Software Change Manager Introduction and Basic Usage course provides an overview of change management practices and describes the role that CA Endevor SCM plays. A general description of CA Endevor SCM configuration defaults is provided along with details of foreground and batch processing tasks that can be performed.
CA Endevor™ Software Change Manager Package Processing and Facilities 5 The CA Endevor™ Software Change Manager Package Processing and Facilities course describes the purpose of packaging and how it is performed in foreground and batch modes. A comparison of functions available using CA Endevor SCM Quick Edit and the CA Endevor SCM ISPF Interface is discussed. The Query facility is also described, along with how to use the Automated Configuration Management data.
  »   CICS v5.3
Course Title Duration Description
CICS TS Operations Series
CICS TS - Introduction
4 The CICS TS - Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated.
CICS - Explorer Fundamentals
3 This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered.
CICS TS - Controlling CICS Operations
6 The Controlling CICS Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems.
CICS Command Simulations
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS.
CICS TS Programmers Series
CICS - Programming Basics
6 The CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product.
Program Control and Communication
6 The CICS Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas.
Files and Databases
4 This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2.
Storage and Transient Data
4 This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues.
Programming for Web Access
4 This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them.
Using CICS Transaction Gateway
3 This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS.
CICS Terminal Communications
6 The CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment.
Using SDF II To Maintain CICS TS Maps
2 This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps.
Programming for Recovery
3 This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery.
Debugging CICS Programs
4 The Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces.
  »   Cloud Computing
Course Title Duration Description
Cloud Computing for Data Centers
5 The Cloud Computing for Data Centers course discusses the evolution of cloud computing and provides you with sources for obtaining additional cloud skills and knowledge. The attributes, and pros and cons of various cloud computing services is supplied and a description of in-house and outsourced cloud deployment models is provided. The final module uses the skills and knowledge you have attained, to create a business case and project plan for a cloud computing project.
  »   COBOL Programming
Course Title Duration Description
COBOL Programming - Basics
6 The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions.
Data and Datafile Definitions in COBOL
4 The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways.
COBOL Programming - Manipulating Data
6 The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index.
COBOL Programming - Advanced
5 The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program.
IBM COBOL for z/OS
4 The IBM COBOL for z/OS course is designed for learners with a basic understanding of generic COBOL. It examines the non-standard implementations of COBOL in COBOL for z/OS. It also looks at compiling COBOL in z/OS, and accessing IBM subsystems such as CICS and Db2. Finally, it explores the importance of using Language Environment.
Accessing IMS Databases from COBOL
3 The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained.
  »   Cryptography Curriculum
Course Title Duration Description
Cryptography
1 This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption has only recently become a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z14 infrastructure are provided, describing how at-rest, and in-flight data associated with those components supports new and existing encryption capabilities.
  »   Data Analysis, Analytics, and Machine Learning Curriculum
Course Title Duration Description
Big Data, Hadoop, and Analytics
4 This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organisations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data.
Machine Learning and Spark 4 This course is designed for those working with organisations looking to implement Machine Learning solutions. It is also of benefit for those looking to implement Spark on z/OS. It begins by explaining what Machine Learning is, how it works, and how organisations can benefit from it. The course then focuses on IBM's Machine Learning for z/OS solution, describing its features and components. In the final course, a description of Apache Spark and how it is used in a Machine Learning solution on a z/OS system, is presented.
  »   Database - Db2 v11
Course Title Duration Description
Db2 Operations Series

Note: Db2 v10 is also available.
Db2 Fundamentals
5 The Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI.
Managing Db2 Operations
4 The Managing Db2 Operations course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart.
Db2 - Database Management System Series
Introduction to RDBMSs and Db2
4 The Introduction to RDBMSs and Db2 course describes from a Database Administrator's (DBA) viewpoint how Db2 is used and the types of Db2-related tasks that the DBA performs. The course also looks at Db2's system configuration requirements and how it is implemented in a z/OS environment.
Manage Data Definitions with Db2
6 The Manage Data Definitions with Db2 course describes how SQL is used to define a Db2 database and its associated objects. It looks at SQL statement syntax and the methods used to invoke SQL statements.
Db2 SQL Fundamentals
4 (Previously titled Manage Data with Db2 SQL in the v10 Curriculm) The Db2 SQL Fundamentals course looks at some of the more common SQL statements used by programmers when starting out. It addresses the code used to obtain Db2 table data, sort it, as well as methods used for inserting, deleting, updating and merging table data.
Advanced Db2 SQL
4 The Advanced Db2 SQL course discusses some of the more advanced SQL code used to manipulate table data. Various methods used for joining tables is presented, along with examples of SQL statements and subqueries used to filter data results.
Create and Maintain Db2 Programs
6 The Create and Maintain Db2 Programs course describes how SQL is invoked from an application program and the interaction that can occur between the application program and Db2. This course also discusses how a Db2 COBOL Program is created.
Db2 Stored Procedures
3 The Db2 Stored Procedures course describes how stored procedures are used and the platforms on which they can be implemented. The benefits derived from using stored procedures are discussed as well as security implications associated with them.
Optimize Db2 Application Performance
5 The Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyse their effectiveness.
  »   Data Center Storage Management
Course Title Duration Description
Storage Fundamentals for Data Centers
5 This course introduces the learner to data center storage, how it has evolved and the direction it is taking. The initial module also discusses the role of the Storage Administrator and where this person can obtain certification, training and general information. The remainder of the course focuses on disk and tape systems describing how they have evolved, how they are used to store data, and various configurations.
Storage Networks, Administration, and DASD Management Using ICKDSF
4 This course describes the common configurations when implementing networked data storage, and includes information relating to cloud based storage structures. An overview of the monitoring and management tasks performed by the Storage Administrator are covered, focusing heavily on performance and capacity aspects. Details on using the ICKDSF program in z/OS, z/VSE and z/VM environments for DASD initialization and other administration tasks, is also covered.
Using DFSMS to Manage the z/OS Storage Environment
6 This course describes today's data storage needs and the role of various DFSMS components in managing that data. It looks at data management rule creation and the role that DFSMShsm plays in ensuring sufficient space is made available.
  »   DevOps and Agile
Course Title Duration Description
DevOps Fundamentals
2 The DevOps Fundamentals course discusses how today's successful business strategies evolve around continuous improvement practices, and how implementing a DevOps environment can partly achieve this goal. Pre and post DevOps scenarios are examined, looking at the structure and characteristics of this environment. Several DevOps-related surveys are examined as well as a number of case studies involved with DevOps adoption. Cultural changes associated with implementing DevOps are discussed, including challenges in this area. Finally, a wide range of commonly used DevOps-related automation tools and their purpose are presented.
Agile Fundamentals
1 The Agile Fundamentals course discusses the business value of adopting an Agile philosophy, introducing a real-life software development project, and describing how Agile is used to restructure traditional software development and deployment tasks. The values and principles associated with the Manifesto for Agile Software Development are explained, while an overview of common frameworks used to adopt Agile philosophes is provided, along with their benefits. Additional Agile training, accreditation, and related supported products and practices are also mentioned throughout the course.
  »   Disaster Recovery
Course Title Duration Description
Ensuring Data Center Business Continuity
3 This course begins by immersing the learner in a full scale disaster, getting them to think about all the elements involved in not only recovering data, but also ensuring that the overall business runs as per expectations. It then describes what business continuity is, citing well known events, and where disaster recovery fits in. The course is then extended to explain common business continuity strategies and looks at standards, in particular ISO22301, to see how current standards tackle this important facet of business life.
  »   IBM Explorer for z/OS
Course Title Duration Description
IBM Explorer for z/OS
2 The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of z/OS and Resource perspectives, and the related views used to display and manage z/OS data.
  »   IBM Mainframe Communications
Course Title Duration Description
IBM Mainframe Communications Concepts
5 The IBM Mainframe Communications Concepts course provides an overview of traditional SNA and TCP/IP communication protocols and the logical and physical components associated with them.
VTAM Commands
5 The VTAM commands course discusses the use of commands to display the status and attributes of VTAM resources. An explanation of the processes used to start, activate, deactivate and stop VTAM resources is also provided.
Mainframe TCP/IP Commands
5 The Mainframe TCP/IP Commands course describes how TCP/IP runs on the mainframe and provides several scenarios where TCP/IP daemon, client application and server application commands are used.
VTAM Command Simulations
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM.
  »   IBM Power Series - AIX
Course Title Duration Description
AIX Fundamentals 5 This course is designed to provide a system administrator with no prior AIX experience an introduction to the background and the fundamental components of AIX. The course covers essential knowledge including concepts, system access and management, and commonly used administrative commands.
AIX Fundamentals for UNIX System Administrators 6 This course is designed to provide existing UNIX administrators a path to understanding the critical differences with AIX. Topics examined include the essential components of AIX, system management, performance improvements, and AIX system troubleshooting.
AIX Virtualization, VIO Server and Management 4 This course is designed to provide the learner with an understanding of the tasks involved in creating and managing a virtualized AIX environment, and assumes the learner has a basic understanding of AIX. Topics covered include the fundamentals of virtualization in AIX environments, an examination of the Virtual I/O Server, and the use of management devices such as the HMC, IVM, or SDMC.
  »   IBM Power Series - IBM i
Course Title Duration Description
IBM i Fundamentals Series
IBM i Fundamentals 5 The IBM i Fundamentals course explains the origins of the IBM i system and describes the configuration of hardware and software needed to support it. It discusses the types of devices that can be used to access the IBM i system and the interfaces most commonly used. Examples are also provided of several products commonly used to perform IBM i administration tasks.
Introduction to IBM i for System Operators 5 The IBM i Fundamentals Series provides learners with an introduction into IBM i from an operations point of view. The courses will familiarise you with the IBM Systems Director Navigator for i, IBM i navigator, and 5250 emulation interfaces and provide examples of some of the tasks that can be performed using them.
Monitoring and Managing IBM i Workloads 5 The Monitoring and Managing IBM i Workloads course provides an overview of the processes involved in monitoring, managing and controlling IBM i workloads and printing.
IBM i System Administration Series
IBM i System Administration Fundamentals 5 This course introduces the learner to the core tasks performed by the IBM i System Administrator, and includes information on system configuration, security, backup, recovery, performance monitoring and capacity planning. The use of third-party and IBM products to achieve these tasks is also discussed. The Management Central software, which is used to monitor and control IBM i system activity and performance is also explained in detail.
IBM i Security Implementation 4 This course focuses on the security-related tasks undertaken by the IBM i System Administrator. As well as discussing how overall security requirements are identified, it also delves deeper to describe how IBM i system security relating to user, system and resource components are created and managed. An overview of IBM i system auditing requirements, implementation and reporting is also provided.
Journal Management 5 This course highlights the importance of IBM i system journaling and describes the type of data that can be captured using this feature. Tasks associated with displaying journal entries, implementing journals, managing journal activity, and recovering data from journals is discussed in detail.
Storage Management 3 This course provides an overview of the levels of disk storage that are available on an IBM i system and how they can be configured for use. Information relating to speed, availability and data recovery features associated with IBM i disk storage are also discussed in detail.
Logical Partitioning and Virtualization 4 This course looks at logical partitioning and the benefits that can be gained from implementing this feature on your IBM i system. Details of the products that can be used to define partitions as well as the process itself is provided, and the management and performance of partitions is also discussed in detail.
IBM i Programming Fundamentals Series
IBM i - CL Programming 8 The CL Programming course introduces programming that uses the iSeries Control Language (CL). It explains how to use the variables utilised in a CL program and control its processing.
IBM i - CL Programming Functions and Messaging 4 The CL Programming Functions and Messaging course describes the more advanced features of Control Language programming. It focuses on how to use CL message handling to monitor the correct execution of CL programs.
IBM i RPG Series
RPG/400 Introduction 6 The RPG/400 Introduction explains the fundamental features and structure of a Report Program Generator (RPG) program. It also describes the concepts of RPG programming.
RPG/400 Coding 4 The RPG/400 Coding course explains the fundamental Report Program Generator (RPG) operation codes that enable programmers to manage field values, perform numeric operations, and manipulate dates for retrieval and viewing.
RPG/400 Programming 4 The RPG/400 Programming course explains how to use Report Program Generator (RPG) features to write reports. It also describes structured programming and how to affect the flow of control.
RPG/400 Workstation Programming 5 The RPG/400 Workstation Programming Introduction course shows how to design and develop screen layouts and how the program can interact with the user to deliver and accept data.
RPG/400 Advanced Workstation Programming 6 The RPG/400 Advanced Workstation Programming course shows how to use the standard IBM i tools to write and compile RPG/400 programs. This course also covers the design and use of dynamic databases in your program.
IBM i Query Series
Database Basics and the Need for Query 4 The Database Basics and the Need for Query course describes the IBM Query for i sort, report and analyze capabilities providing examples on how IBM Query for i is used to create business reports. Basic concepts relating to database structure and the data that can be accessed by IBM Query for i are explained in detail.
Creating a Simple Query 6 The Creating a Simple Query course begins by describing how database files are joined, enabling IBM Query for i to more easily reference data. This is followed by the identification of data that will be required by IBM Query for i and the subsequent coding required to extract that information. Details on options used to save the query and print, or display, the resulting report are also covered.
Advanced Query Features and Management 6 The Advanced Query Features and Management course begins by looking at more complex capabilities associated with query definitions. It then moves into the management of queries, explaining how queries can be copied, modified, deleted, printed and run. The Data File Utility and its purpose are discussed, and finally a number of tips when managing queries are provided.
IBM i Application Programming Introduction Series
Db2 for IBM i - Introduction for Programmers 3 This course is intended for new programmers, with some existing operational knowledge of databases and the workings of the IBM i system, who will be writing programs which access the IBM i database. At the completion of the course the student will have a basic understanding of the IBM i system's data file specifications (DDS) for both Physical and Logical files. This course is not intended to teach the basic operations of IBM i system and its usage.
  »   IBM System z and z/OS Fundamentals Mastery Test
Course Title Duration Description
This group of courses and assessments prepares the student for the IBM System z and z/OS Fundamentals Mastery test. It examines entry level zEnterprise fundamental concepts, system programmer and other user role tasks. The test is applicable to those completing the recommended education or those who have recently moved into a zEnterprise environment.

Once completed you may decide to schedule your exam with Pearson VUE(an external testing provider)
Introduction to the IBM Enterprise Environment 4 This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe.
z/OS Systems Programming Fundamentals 6 This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues.
Systems Programming on z/OS Practice Assessment 1 This assessment measures your general knowledge of the tasks performed by the system programmer.
IBM Development Environment 6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented.
Application Programming on z/OS Practice Assessment 1 This assessment measures your general knowledge of the z/OS programming languages and processes associated with creating an executable module.
Using Online System Facilities - TSO/ISPF 5 The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured.
CICS TS - Introduction 4 The CICS TS - Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated.
Introduction to RDBMSs and the Db2 4 The Introduction to RDBMSs and Db2 course describes from a Database Administrator's (DBA) viewpoint how Db2 is used and the types of Db2-related tasks that the DBA performs. The course also looks at Db2's system configuration requirements and how it is implemented in a z/OS environment.
Introduction to Websphere Application Server 1 This course introduces IBM WebSphere Application Server for z/OS. The course includes, the role of an application server and how WebSphere Application Server provides Web access to mainframe data
Introduction to WebSphere MQ 5 This course provides the learner with basic information about WebSphere MQ on z/OS: features, functions and issues that differ from WebSphere MQ on other platforms.
Managing Data Files and Definitions with ISPF/PDF 5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of data sets and how functions such as; copying, printing, renaming and deleting are performed on these objects.
Maintaining Data in Files with the ISPF Editor 7 The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse and edit data within a data set.
Online Workloads for z/OS Practice Assessment 1 This assessment measures your general knowledge of the middleware products commonly used to facilitate z/OS online processing
JCL (z/OS) - Introduction to z/OS JCL 3 The JCL (z/OS) - Introduction to z/OS JCL course describes the purpose of Job Control Language (JCL) in a z/OS environment and describes the three most commonly used JCL statements: JOB, EXEC and DD. Details of common parameters associated with these statements, along with examples on how they are used, are also provided.
Introduction to z/OS and the Mainframe Environment Practice Assessment 1 The assessment is designed for IT staff who work with z/OS or the mainframe, and those preparing to take the IBM System z Entry Level for z/OS System Programmer Mastery Test.
  »   IMS (Information Management System)
Course Title Duration Description
IMS v15 Series
IMS 15 Introduction
5 The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts.
IMS 15 Commands
4 The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided.
IMS 15 Databases
4 The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations.
IMS 15 Transaction Manager for Programmers
4 This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use.
  »   Introduction to the IBM Environment
Course Title Duration Description
Introduction to the IBM Enterprise Environment
4 This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe.
z/OS Systems Programming Fundamentals 6 This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues.
IBM Development Environment
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented.
  »  Introduction to the IBM Environment 2.3
Course Title Duration
(hours)
Description
Introduction to the IBM Enterprise Environment
4 This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe.
z/OS Systems Programming Fundamentals 6 This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues.
IBM Development Environment
6 This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C ++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented.
  »   Java Programming
Course Title Duration Description
Java on z/OS for Java Programmers 1 This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere.
Java Introduction for the IBM Enterprise 3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment.
Java Programming for the IBM Enterprise 7 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent.
Java Data Access for the IBM Enterprise 3 This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems.
  »   JCL (Job Control Language)
Course Title Duration Description
JCL (z/OS) - Introduction to z/OS JCL
3 The JCL (z/OS) - Introduction to z/OS JCL course describes the purpose of Job Control Language (JCL) in a z/OS environment and describes the three most commonly used JCL statements: JOB, EXEC and DD. Details of common parameters associated with these statements, along with examples on how they are used, are also provided.
JCL (z/OS) - Using Special Data Sets in Batch Jobs
5 The JCL (z/OS) - Using Special Data Sets in Batch Jobs course examines how special data sets, such as generation data groups, tape data sets, and temporary data sets are referenced using JCL. It also describes how data sets can be concatenated in JCL and some of the reserved DD statement names and their uses.
JCL (z/OS) - Identifying and Resolving Batch Problems in JCL
3 The JCL (z/OS) - Identifying and Resolving Batch Problems course examines the use of the COND parameter and the IF/THEN/ELSE JCL statement construct, showing how they can be used to control the flow of steps throughout a job. A list and description of common condition codes and abends is provided along with their causes and possible resolution.
JCL (z/OS) - Coding Procedures and JES2 Control Statements
4 The JCL (z/OS) - Coding Procedures and JES2 Control Statement course demonstrates how to create JCL procedures. It also covers the use of override statements and symbolic substitution of values within a procedure. It examines how parameter values can be passed, and how backward references can be used between steps. Finally, it describes the use of the JES control statement in determining the environment that a job should run under, and the OUTPUT statement and its role in determining where output should be sent for printing.
JCL(z/OS) – Advanced
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with z/OS 2.2 and z/OS 2.3, and provides details on statements and parameters that have evolved over the last few years.
  »  JCL 2.3 (Job Control Language)
Course Title Duration
(hours)
Description
JCL (z/OS) – Introduction to z/OS JCL
3 The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters.
JCL (z/OS) – JCL Coding Basics - JOB and EXEC Statements
4 This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements.
JCL (z/OS) - JCL Coding Basics - DD Statements
6 The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones. It also looks at the coding for printed output and job sysout.
JCL (z/OS) - Advanced JCL Data Set Use
5 The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium.
JCL (z/OS) - Controlling Job and Step Processing
3 This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed.
JCL (z/OS) - Working with Procedures and Symbols
3 This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide.
JCL (z/OS) - Running and Debugging JCL
3 This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job.
JCL (z/OS) – Advanced - Tips & Tricks
1 This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with z/OS 2.2 and z/OS 2.3, and provides details on statements and parameters that have evolved over the last few years.
  »   JES (Job Entry Subsystem)
Course Title Duration Description
JES2 Concepts, Commands, and Application Series
JES2 System Initialization and Shutdown
5 This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology. A number of scenarios are presented that describe how JES2 devices are used, their possible statuses, and how jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes.
Monitoring Batch Jobs with JES2
4 This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status.
Using JES2 in Scheduling Batch Jobs
5 This course builds from the previous and discusses some of the more commonly used JES2 commands used to manipulate initiator and printer resources and activity. A focus on the JES2 commands associated with modifying batch job attributes as they progress through the JES2 queues is also provided. The display and management of network-related JES2 components is also mentioned.
Identify and Resolve JES2 Batch Problems
5 This course provides you with examples of common JES2 job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues. Detailed information relating to the function of JES2 checkpoints, their placement, and attributes is provided along with steps required to resolve problems associated with this resource.
Identify and Resolve JES2 System Problems
5 This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully.
JES2 Command Simulations
2 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources.
JES2 – Advanced .5 This course contains many JES2-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
  »   Linux
Course Title Duration Description
Introduction to Linux
5 The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed.
The Linux File System
5 The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed.
Editing with VI
4 The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided.
Linux Shell Programming
4 The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors.
Linux Operations
4 The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization.
Linux on IBM Z Fundamentals
5 The Linux on IBM Z Fundamentals course discusses available Linux distributions for the IBM Z environment, its operational implementation, and the general monitoring and management of Linux. The final module provides an overview of the performance monitoring and management tasks performed by the Linux Administrator, and contains tips for best practice in these areas.
  »   Mainframe Application Performance Curriculum
Course Title Duration Description
Introduction to Sampling Performance Tools 1 This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions.
  »   PL/1 Programming
Course Title Duration Description
PL/1 Fundamentals and Data Representation
5 The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language.
PL/1 Program Design Techniques
5 The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions.
PL/1 Accessing Data in Files
5 The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions.
PL/1 Preprocessor, Debugging and Advanced Coding
5 The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language.
  »   Rational Developer for System z
Course Title Duration Description
Rational Developer for System z Basics
4 This course introduces the learner to the IBM Rational Developer for System z (RDz) product describing the general tasks that can be performed using it, as well as its configuration and other features. A guide to RDz's GUI interface is provided including details on connecting to resources on a host system.
Creating and Managing Applications Using RDz
4 This course describes the methods used to create, manage and maintain applications under RDz. It provides details on the benefits of projects and subprojects within RDz and the application tasks that can be performed within this structure. RDz testing and debugging capabilities are discussed in detail, in particular the zUnit testing framework, and the IBM Integrated Debugger. The final module addresses the RDz features that allow you to create applications for Db2, CICS and IMS.
  »   Related Products★
Course Title Duration Description
CLISTS Introduction 6 The CLISTS Introduction course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS.
Virtual Tape Server (VTS)
3 The Virtual Tape Server (VTS) course introduces the student to the concepts, functions, and capabilities of a VTS and explains how a VTS operates. Information describing the VTS hardware and software components is provided including the commands used to monitor and maintain a VTS in the z/OS operating environment.
  »   REXX (REstructured eXtended eXecutor language)
Course Title Duration Description
Introduction to the REXX Programming Language
4 The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program.
REXX Keyword Instructions
6 The REXX Keyword Instructions course discusses the common keyword instructions used in REXX coding and describes how looping and execution control instructions are invoked.
REXX Built-In Functions
6 The REXX Built-In Functions course describes the standard built-in functions that are available with REXX.
REXX with z/OS and TSO/E
6 The REXX with z/OS and TSO/E course explains how REXX is used in TSO and z/OS environments.
  »   SDSF (System Display and Search Facility)
Course Title Duration Description
SDSF Concepts and Operation
8 The SDSF Concepts and Operation course describes the purpose of SDSF, providing details on how it is accessed and how you interact with it. The course then explains how data is located and the use of filtering commands to display specific information. Details of SDSF initialization and shutdown are provided with solutions to common problems. Finally, a description of SDSF logs and how they are used is covered.
Using SDSF to Control Job Processing
7 The Using SDSF to Control Job Processing course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands. Control of overall batch job activity through the use of MAS, Scheduling Environments and Initiators is also discussed.
Using SDSF to Display, Manipulate and Print Job Output
6 The Using SDSF to Display, Manipulate and Print Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether. Details associated with displaying and modifying printer attributes and activity are also covered.
Using SDSF to Manage System Resources and Devices 6 The Using SDSF to Manage System Resources and Devices course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages. Details associated with displaying and managing spool, and JES2 node and line activity are also explained.
SDSF – Advanced 1.5 This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
  »   Security (RACF and CA ACF2)
Course Title Duration Description
Introduction to Mainframe Security Series
Introduction to Mainframe Security
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
RACF Series
Defining Users to RACF
6 The Defining Users to RACF course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users and groups system security access.
Protecting System Resources Using RACF
6 The Protecting System Resources Using RACF course describes how RACF is used to define access to data sets. Details of the profiles used to provide access to general resources and UNIX resources is also explained.
RACF for System Administrators and Auditors
4 The RACF for System Adminstrators and Auditors course describes the skills needed to audit security access in an RACF controlled system. It includes setting up auditing options and interpreting audit data.
  »   Service Oriented Architecture
Course Title Duration Description
Service Oriented Architecture 4 This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption.
  »   Tivoli Workload Scheduler for z/OS
Course Title Duration Description
Understanding How Tivoli Workload Scheduler Processes Work
3 The Understanding How Tivoli Workload Scheduler Processes Work course discusses the need for workload scheduling in today's enterprise organization, and provides general information describing how Tivoli Workload Scheduler processes jobs.
Monitoring and Managing the Tivoli Workload Scheduler for z/OS Environment
6 The Monitoring and Managing the Tivoli Workload Scheduler for z/OS Environment course describes how Tivoli Workload Scheduler is used to monitor and manage batch processing flows. Details relating to job restart and recovery using this product, are also provided.
Scheduling with Tivoli Workload Scheduler for z/OS
6 The Scheduling with Tivoli Workload Scheduler for z/OS course explains how JCL is configured for the Tivoli Workload Scheduler environment and how job schedules are created.
Maintaining the Integrity of Tivoli Workload Scheduler for z/OS
4 The Maintaining the Integrity of Tivoli Workload Scheduler for z/OS course describes the creation and modification of current plans and long-term plans and the backup and recovery associated with them.
  »   TSO/ISPF (Time Sharing Option and Interactive Systems Productivity Facility)
Course Title Duration Description
Using Online System Facilities - TSO/ISPF
5 The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured.
Managing Data Files and Definitions with ISPF/PDF
5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of data sets and how functions such as; copying, printing, renaming and deleting are performed on these objects.
Maintaining Data in Files with the ISPF Editor
7 The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse and edit data within a data set.
TSO/ISPF – Advanced
2.5 This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
  »  TSO/ISPF 2.3 (Time Sharing Option & Interactive Systems Productivity Facility)
Course Title Duration
(hours)
Description
ISPF (z/OS) - Using Online System Facilities - TSO/ISPF
5 The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured.
ISPF (z/OS) - Managing Data Files and Definitions with ISPF/PDF
5 The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects.
ISPF (z/OS) - Maintaining Data in Files with the ISPF Editor
7 The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse, and edit data within a data set.
TSO/ISPF – Advanced - Tips & Tricks
2.5 This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
  »   Utilities
Course Title Duration Description
z/OS Batch Utilities Series
General Data Set Utilities
4 This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Data Utilities
5 This course looks at the IEBGENER, ICEGENER, IEBCOMPR, IEHLIST and DFSORT utilities and provides real-life examples describing how they are used to interrogate and modify data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail.
Utilities – Advanced
1.5 This course contains many Utility-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
VSAM Series
Introduction to VSAM
7 This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors.
  »   Virtualization (z/VM)
Course Title Duration Description
Version 6.3
z/VM Concepts, System Initialization and Shutdown
6 The z/VM Concepts, System Initialization and Shutdown course describes how virtualization, and in particular z/VM, has become more popular in Data Centers and examines the processes used for z/VM start-up and shutdown.
Monitoring and Controlling z/VM Operations
5 The Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources.
Managing Guest Operating Systems
6 The Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM and the methods used to create, display and manipulate CMS files.
Identifying and Resolving z/VM Problems
5 The Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also described.
Linux on z Systems Fundamentals
5 The Linux on z Systems Fundamentals course discusses common Linux distributions for the z systems environment, how Linux is accessed, its operational implementation, and the general monitoring and management of Linux. The Administrator module provides an overview of the tuning, monitoring, and analyzing tasks performed by the Linux Administrator and contains tips for best practice in these areas.
  »   WebSphere
Course Title Duration Description
Introduction to WebSphere Application Server
1 This course introduces IBM WebSphere Application Server for z/OS. The course includes the role of an application server and how WebSphere Application Server provides Web access to mainframe data.
Introduction to WebSphere MQ
5 This course provides the learner with basic information about WebSphere MQ on z/OS: features, functions and issues that differ from WebSphere MQ on other platforms.
  »   zEnterprise
Course Title Duration Description
Introduction to the IBM Z Mainframes
7 This course discusses how world trends are affecting many aspects of IBM Z mainframes created today, with several case studies being presented that explain the benefits organisations are gaining from their implementation. An in-depth look inside the z13, and entry-level z13s mainframes, as well as the premier z14 mainframe are provided, highlight many features and components that are required to keep today's businesses securely running 24 x7. An overview of the zBX distributed environment is also provided, explaining how it can be integrated with the mainframe. Details of the LinuxONE system, IBM's current all-Linux mainframe, is covered, explaining its value in today's IT landscape.
Introduction to zEnterprise - EC12, BC12 and zBX
5 This course describes how the zEnterprise system manages workloads across heterogeneous platforms and describes the components that comprise and support this system. The course above has replaced this course and it will retire on April 30, 2018.
Course Title Duration Description
z/OS Concepts and Components
5 The z/OS Concepts and Components course describes the evolution of mainframe computing and provides descriptions of the major components that comprise today's z/OS environment. Details of general z/OS processing concepts are also provided.
Initializing and Terminating the z/OS System
4 The Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system startup and shutdown, describing the most common commands and operator responses.
Monitoring the z/OS System
5 The Monitoring the z/OS System course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices. An overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS are also provided as well as a description on how SMF data is created and controlled. This course also discusses the need for message suppression and describes how this is achieved.
z/OS Architecture
4 The z/OS Architecture course examines the logical architecture of a z/OS system. It looks at the use and structure of the Program Status Word (PSW), the different types of interrupts handled by the system, and how they are invoked. It also describes the concepts and use of virtual storage and how it relates to address spaces within the system. Finally, it identifies the functions used by the System Resource Manager to balance and maximize system performance.
Identifying z/OS System Problems
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognised, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalogue address space.
Resolving z/OS System Problems
5 The Resolving z/OS System Problems course describes the processes and commands required to resolve common z/OS system problems. It also describes when cancel and force commands should be used and how to handle command flooding.
z/OS – Advanced 2 This course contains many z/OS-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
z/OS Console Simulators Series
z/OS MVS Command Simulations
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS System Shutdown and IPL Simulations
.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shutdown and start-up of a z/OS system.
Installing and Managing z/OS Software Series
Introduction to SMP/E 3 Ensuring that all of your organization's z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software.
  »  z/OS 2.3
Course Title Duration
(hours)
Description
z/OS Concepts and Components
7 The z/OS Concepts and Components course describes the evolution of mainframe computing and provides descriptions of the major components that comprise today's z/OS environment. Details of general z/OS processing concepts are also provided.
Initializing and Terminating the z/OS System
4 The Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system startup and shutdown, describing the most common commands and operator responses.
Monitoring the z/OS System
5 This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices. An overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS are also provided as well as a description on how SMF data is created and controlled. This course also discusses the need for message suppression and describes how this is achieved.
Identifying z/OS System Problems
5 The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space.
Resolving z/OS System Problems
5 The Resolving z/OS System Problems course describes the processes and commands required to resolve common z/OS system problems. It also describes when cancel and force commands should be used and how to handle command flooding.
z/OS – Advanced - Tips & Tricks 2 This course contains many z/OS-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.2 and z/OS 2.3.
z/OS Console Simulators Series
z/OS MVS Command Simulations
3.5 A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources.
z/OS System Shutdown and IPL Simulations
.5 Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shutdown and start-up of a z/OS system.
  »   z/OS Connect
Course Title Duration Description
Introduction to z/OS Connect
1 The Introduction to z/OS Connect course discusses the need for organization's to open up their mainframe data to cloud, mobile and web customers and describes how z/OS Connect provides this capability. The last section of this course is for IT specialists that need to know how resource access and data communication is performed by z/OS Connect.
  »   z/OS Management Facility
Course Title Duration Description
The z/OS Management Facility 6 This course provides the learner with a basic understanding of the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it.
  »   z/OS UNIX System Services
Course Title Duration Description
z/OS UNIX System Services - Basics
3 This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used.
Interacting with the z/OS UNIX System
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
Working with z/OS UNIX
4 This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing.
  »  z/VSE Curriculum
Course Title Duration
(hours)
Description
z/VSE Basics 4 The z/VSE Basics course discusses mainframe operating systems and identifies the types of organizations using z/VSE. It provides an overview of the z/VSE infrastructure describing the personnel likely to interact with it and provides examples of typical data processing on this system.
z/VSE for Operators 4 The z/VSE for Operators course looks at z/VSE from an Operations viewpoint, describing how they access the system and perform startup and shutdown processing. A description of common operator tasks, and the commands used to display, monitor, and resolve problems associated with the z/VSE system are also provided.

Non-Mainframe Subject Areas

  »   Business Strategy and Operations
Marketing Curriculum
Essential Marketing Strategies
Essentials of Public Relations
Marketing in the Digital Age
Operations Curriculum
Business Process Improvement
Managing for Operational Excellence
Operations Management: Efficiency of Production
Six Sigma Black Belt (2015 BOK)
Six Sigma Green Belt
Six Sigma Yellow Belt
Understanding Lean Production
Strategic Planning Curriculum
Big Data Basics
Fundamentals of Business Planning
Strategic Risk-taking
The Quality Management of Data
Thinking Strategically and Managing Risk
  »   Enterprise Database Systems
Big Data
Accessing Data with Spark
Apache Hadoop and MapReduce Essentials
Apache Kafka
Apache Solr Essentials
Apache Storm Introduction
Big Data – The Corporate Leadership Perspective
Big Data – The Engineering Perspective
Big Data – The Legal Perspective
Big Data - The Marketing Perspective
Big Data – The Sales Perspective
Big Data – The Strategic Planning Perspective
Big Data Development with Apache Spark
Big Data Fundamentals
Big Data Operations
Data Modeling for Hadoop
Designing and Implementing Big Data Analytics
Hadoop Ecosystem
Hadoop Operations
Hadoop Installation and Maintenance
IBM BigInsights Fundamentals
Business Intelligence
Business Intelligence with TIBCO Spotfire
Business Intelligence with QlikView
Microsoft SQL Server Data Warehousing and Business Intelligence Introduction
Data Science
Analyzing Big Data with Microsoft R
Creating Real Time Dashboards
Data Analysis Application
Data Architecture: Getting Started
Data Science Essentials
Data Science Using R
Deploying Data Tools for All Users
Enterprise Governance Strategies
Getting Started with Hive
Implementing Data Access and Governance Policies
Microsoft Azure HDInsight
MongoDB for Data Wrangling
Perform Cloud Data Science with Azure Machine Learning
Powering Recommendation Engines
R for Data Science
Statistics for Data Science #1
Statistics for Data Science #2
Streaming Data Architectures
Working with HDFS
Data Visualization
Data Visualization Essentials
Microsoft Power BI
Tableau Data Visualization and Analytics
Microsoft SQL Server 2016
Microsoft SQL Server 2016: Administering
Microsoft SQL Server 2016: Developing
Microsoft SQL Server 2016: Provisioning
Microsoft SQL Server 2016: Querying
MySQL and No SQL
Apache Cassandra
Apache HBase Fundamentals
Cassandra for SQL Developers
MongoDB Development
MySQL Database Development
NoSQL
RavenDB Fundamentals
Oracle 12c
Oracle Database 12c R2 SQL
Oracle Database 12c: Backup and Recovery
Oracle Database 12c: Install and Upgrade
Oracle Database 12c: Introduction to SQL
Oracle Database 12c: New Features for Administrators
Oracle Database 12c: Performance Tuning
Oracle Database 12c: RAC Administration
Oracle Database: 12c Administration Ed 2
Systems and Database Design
Generic Database Fundamentals
Generic Design and Modeling Databases
  »   Enterprise Resource Planning Systems
Microsoft Dynamics
Business Intelligence with Microsoft Dynamics CRM 2013
Microsoft Dynamics CRM 2013: Applications
Microsoft Dynamics CRM 2013: Customization and Configuration
Salesforce
Creating Employee Apps with Force.com
Developing Applications in Force.com
SAP
SAP Business Suite 7 for End Users
SAP Business One for End Users
SAP Business Objects Business Intelligence
  »   Finance, Human Resources and Administration
Administrative Support Curriculum
Administrative Support: Secrets to Success
Finance and Accounting Curriculum
Accounting Basics
Accounting for Non-Financial Professionals
Cost Consciousness in the Workplace
Human Resources Curriculum
Crisis Management
Effective Hiring Practices
Professional in Human Resources Exam Prep
Recruiting, Screening, and Onboarding Effectively
SHRM- SCP: HRM for Senior HR Professionals
SHRM-CP/SCP: Workplace Management and HR
SHRM-CP/SCP: HR Competencies
SHRM-CP/SCP: HR Strategy Management
SHRM-CP/SCP: Management of People
SHRM-CP/SCP: Organization and the HR Function
Transformational HR and Talent Management
  »   Internet and Network Technologies
Cloud Computing
Advanced Architecting on Amazon Web Services
Amazon Web Services Solution Architect - Associate 2018
Amazon Web Services Solution Architect – Professional
Architecting Microsoft Azure Solutions - 2018 Update
Architecting on Amazon Web Services
AWS Certified Developer - Associate
AWS Certified SysOps Administrator – Associate
AWS Essentials
AZ-200: Microsoft Azure Developer Core Solutions
Certified Cloud Security Professional (CCSP)
Cloud Computing for the Business User
Cloud Computing Technology Fundamentals
CompTIA Cloud+ CV0-002
Design and Implement Cloud Platform Solutions
Developing Microsoft Azure Solutions
Engineering DevOps on Amazon Web Services
Google Cloud Architect
Google Cloud Platform Fundamentals
Google Cloud SQL for Developers
Google Data Engineer
Google G Suite Administrator
Implementing Microsoft Azure Solutions
Managing Citrix XenDesktop 7 Solutions
Microsoft SCCM 2012: Administering and Deploying
OpenStack Fundamentals
Serverless Architecture Using AWS
Systems Operations on Amazon Web Services
Virtualizing Enterprise Desktops and Apps
Network Management and Security
Juniper Networks Junos Essentials
Software Defined Networking Essentials
Security Solutions
Certified Ethical Hacker (CEH) v10
Certified Information Security Manager (CISM) - 2018 Update
Certified Information Systems Auditor
Certified Secure Software Lifecycle Professional (CSSLP)
Certified Systems Security Professional (CISSP)
COBIT 5 Foundation
CompTIA Advanced Security Practitioner (CASP+)
CompTIA Cybersecurity Analyst+ CS0-001
CompTIA PenTest+ PT0-001
Cryptography Fundamentals
Cybersecurity 101
Exploring Security Trends
Foundations of Android Security
Foundations of iOS Security
Microsoft Security Fundamentals - 2018 Update
OWASP Top 10
Securing Mobile Devices in the Enterprise
Securing User Accounts
Systems Security Certified Practitioner
Systems Security Certified Practitioner (SSCP) 2018
Social Networking
Buffer for Business Users
Flickr for End Users
  »   Management and Leadership
Leadership Curriculum
Business Acumen Essentials
Creating a Positive Atmosphere
Developing Leadership Skills
Improving Leadership Skills
Leading Virtual Teams
Leveraging Leadership Techniques
Organizational Awareness
Performance Measurement
Women in Leadership
Management Curriculum
Achieving Success through Delegation
Advanced Management Techniques
Coaching to Drive Success
Empowering Employees
Final Exams
First Time Manager Essentials
Leveraging Key Management Techniques
Managing a Multigenerational Workforce
Managing Employee Performance
Managing in Difficult Times
Managing Technical Teams
  »   Operating Systems and Server Technologies
CompTIA
CompTIA A+ 220-1001
CompTIA A+ 220-1002
CompTIA A+ 220-901
CompTIA A+ 220-902
CompTIA A+ Exam 220-901
CompTIA A+ Exam 220-902
CompTIA Linux+ 2014 Powered By LPI: LX0-103
CompTIA Linux+ 2014 Powered By LPI: LX0-104
CompTIA Server+ 2014
DevOps
Automating Your IT Infrastructure
Automation with Terraform
DevOps with Ansible and SaltStack
Docker – Beyond the Basics
Docker for Windows Server
Elasticsearch Development
Fundamentals of DevOps
HP LoadRunner 12 Essentials
Kubernetes and Application Containers
Master DevOps with Puppet
Mastering DevOps with Chef
Mastering DevOps with JavaScript
Mastering DevOps with Jenkins
Mastering DevOps with Python
Mastering DevOps with Splunk
Mastering Docker for DevOps
Performance Engineering
PowerShell for Server 2016
RabbitMQ
Shell Scripting Essentials
Using Docker
Using Vagrant
Vagrant Development Environments
Microsoft Exchange Server 2016
Designing and Deploying Exchange Server 2016
Server 2016: Install, Store, and Compute - 2018 Update
Server 2016: Networking - 2018 Update
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2: Administration
Microsoft Windows Server 2012 R2: Configuring Advanced Services
Microsoft Windows Server 2012 R2: Designing and Implementing an Infrastructure
Microsoft Windows Server 2012 R2: Implementing an Advanced Infrastructure
Microsoft Windows Server 2012 R2: Installing and Configuring
Office 365
Enabling Office 365 Services
Managing Office 365 Identities and Requirements
VMware
Exploring VMware vSphere 6.5
VMware Certified Cloud Associate
VMware Certified Cloud Professional
VMware NSX Network Virtualization
VMware Overview
VMware vSphere 6 Install, Configure, Manage: Part 1
VMware vSphere 6 Install, Configure, Manage: Part 2
VMware vSphere 6.5: Install, Configure, and Manage
VMware Workstation 11 Fundamentals
Windows PowerShell
Advanced PowerShell Desired State Configuration
Microsoft PowerShell and Exchange Server
Microsoft PowerShell and SharePoint
Microsoft PowerShell and SQL Server
Microsoft PowerShell for Windows
Windows PowerShell Desired State Configuration
  »   Productivity and Collaboration Tools
Adobe, Graphic Design and Page Layout
Adobe Acrobat DC
Adobe Acrobat Pro X1
Adobe Captivate 9 Fundamentals
Adobe CC Overview New Features
Adobe ColdFusion 10
Adobe Dreamweaver CC
Adobe Edge Animate CC
Adobe Flash Professional CC
Adobe Illustrator CC
Adobe InDesign CC
Adobe Photoshop CC
Adobe Premiere Elements 13
Adobe Premiere Pro CC

Alternative versions available.
Collaboration Tools
Basecamp 3
Cisco Jabber 11.8 for Windows
Cisco WebEx for Web
Cisco WebEx for Windows
Cisco WebEx Teams
Confluence Web
Convo
Gmail Web
Join.me for Windows
LogMeIn GoToMeeting
LogMeIn GoToWebinar
Google
Gmail
Google AdWords
Google Analytics
Google Analytics for Web
Google Apps Fundamentals
Google Docs
Google Drawings
Google Drive
Google Forms
Google Hangouts
Google Hangouts Meet
Google Keep
Google Photos
Google Sheets
Google Sites
Google Slides
Google Team Drives
IBM for End Users
IBM Connections Cloud
IBM Notes 8.5
IBM Notes 9
IBM Sametime Connect 9
IBM Sametime Web Chat 9
IBM Verse 2016
Microsoft Office 2016
Office 2016 First Look
Microsoft Office 2016: New Features
Microsoft Office 2016: Beginning Access
Microsoft Office 2016: Beginning Excel
Microsoft Office 2016: Beginning OneNote
Microsoft Office 2016: Beginning Outlook
Microsoft Office 2016: Beginning PowerPoint
Microsoft Office 2016: Beginning Project
Microsoft Office 2016: Beginning Visio
Microsoft Office 2016: Beginning Word
Microsoft Office 2016: Intermediate Excel
Microsoft Office 2016: Intermediate Outlook
Microsoft Office 2016: Intermediate PowerPoint
Microsoft Office 2016: Intermediate Word
Microsoft Office 2016: Advanced Excel
Microsoft Office 2016: OneNote for iPad
Microsoft Office 2016: PowerPoint Best Practices
Microsoft Office 2016: SharePoint for End Users
Microsoft Office OneDrive
Outlook Mail for Web
Skype for Business 2016

Alternative version available. Also available for iPad, iPhone, iOS and Mac.
Microsoft Office 365
Microsoft Office Online and Office 365
Microsoft Office 365 for Advanced Business Users
Microsoft Office 365: Delve
Microsoft Office 365: Excel
Microsoft Office 365: Flow 2018
Microsoft Office 365: Forms
Microsoft Office 365: Groups
Microsoft Office 365: OneDrive for Business 2017
Microsoft Office 365: OneNote Online
Microsoft Office 365: Outlook
Microsoft Office 365: Planner
Microsoft Office 365: PowerPoint Online
Microsoft Office 365: SharePoint Online
Microsoft Office 365: Stream
Microsoft Office 365: Teams
Microsoft Office 365: Word Online
Microsoft Office 365: Yammer
Microsoft Windows 10
Microsoft Windows 10 End User
Microsoft Windows 10 Fall Creators Update

Also available: Microsoft Windows 8, 7, Vista, XP and earlier.
Productivity Tools
Asana for Web
Box
Circuit for Web 2018
Dropbox for Web
Dynamics 365 for Sales
Evernote 6
Freemind 1.0.1
Hootsuite
JIRA Fundamentals
Jive-n Cloud 2018
Microsoft Power BI
Microsoft To-Do for iOS
MindManager 2016
Pocket for Web
Prezi Classic
Salesforce Chatter
Salesforce Chatter for Lightning
Salesforce Lightning
Scoop.it for Web
Slack 2016
Smartsheet 2018
Tableau Data Visualization and Analytics
Trello
Social Networking Tools
Instagram for iOS
LinkedIn for Web
Pinterest for iOS
Pinterest for Web
Tumblr for Android
Tumblr for iOS
Tumblr for Web
Twitter for iOS
Twitter for Professionals
Twitter for Web
YouTube for Web
  »   Professional Effectiveness
Communication Curriculum
Achieving Emotional Intelligence
Communicating Internationally
Communicating Tactfully and Diplomatically
Communicating with Senior Executives
Cross-Cultural Communication
Dealing with Workplace Conflict
Developing Effective Negotiation Skills
Developing Your Listening Skills
Effective Business Meetings
Effective Business Writing
Effective Communication
Essential Skills for Professional Telephone Calls
Getting Results through Personal Power
Making the Most of Your Presentations
Managing and Controlling Anger
Note-taking Skills
Practical Grammar for Business Writing
Skills for Communication Success
Storytelling Basics
The Art of Feedback
Using E-mail Effectively in the Workplace
Working with Difficult People
Writing a Business Case
Writing Skills for Technical Professionals
Personal Development Curriculum
360 Degree Relationships
Building, Rebuilding and Sustaining Trust
Business Ethics Essentials
Creating Lasting Organizational Change
Creativity in the Workplace
Dealing with Setbacks
Developing Your Critical Thinking Skills
Digital Economy Skills
Discovering Your Strengths
Diversity on the Job
Facing Problems and Making Decisions
Growth Mindset
Improving Your Memory
Improving Your Personal Productivity
Improving Your Reading Speed
Improving Your Work/Life Balance
Managing Your Career
Mentor Relationships
Navigating through Organizational Change
Overcoming Procrastination
Performing Under Pressure
Perseverance at Work
Polishing Your Professional Edge
Public Speaking Strategies
Time Management
Unconscious Bias
  »   Project Effectiveness
Business Analysis
Effective Business Analysis Techniques (BABOK® v3)
Key Business Analysis Competencies (BABOK® v3)
Key Business Analysis Concepts (BABOK® v3)
Project Management Curriculum
CompTIA Project+ PK0-004
PMBOK® Guide Sixth Edition
PMI Agile Certified Practitioner (PMI-ACP)®
PRINCE2® - Foundation (2017 Update)
Project Management Ethics and Values
Project Management for All
Team Building Curriculum
Leveraging Team Leadership Skills
Making a Pitch
Optimizing Performance on a Team
Virtual Teams
  »   Sales and Customer Facing Skills
Customer Service Curriculum
Customer Service Skills
Essentials of Customer Service
ITIL® 2011 Edition Intermediate Level: Operational Support and Analysis (OSA)
ITIL® 2011 Foundation
Industry Foundations
Industry Overviews
Sales Curriculum
Sales Foundations
  »   Software Development
Defensive Programming
Defensive Programming in C/C++
Defensive Programming in C#
Defensive Programming in JavaScript and HTML5
Defensive Programming in iOS
Defensive Programming in Android
Secure Programming
Generic Languages
Asynchronous Programming with Clojure
C++ Programming
Getting Started with MATLAB
Introduction to R Programming
Introduction to Scala
Introduction to Scalding
Introduction to Swift Programming
Perl Programming Essentials
Programming with ANSI C
Python for Data Science
Python Fundamentals
Ruby Full Stack Development
Ruby on Rails 4.2
Working with Clojure
Java 2 Programming
Defensive Programming in Java
Develop Microservices with Java and Spring Cloud
Developing Applications Using Java Spring
Introduction to Java EE 6
Java Hibernate
Java Hibernate with Oracle 12c
Java Multi-Tenant Cloud Programming Fundamentals
Java Reactive Programming
Java SE 8 Fundamentals
Java SE 8 Programming
Java SE7 Fundamentals
Java SE7 Professional
Java SE9 Development
Using Akka
Working with Java SE 7
Microsoft Web Applications
Developing Microsoft Azure and Web Services
Microsoft Azure
Microsoft Azure and Web Services
Programming in HTML5 with JavaScript and CSS3
WCF Essentials
Web API Essentials
Microsoft .NET Software Development Tools
Architecture N-Tier/REST
F# Fundamentals
Introduction to ASP.NET Core 1.0 and MVC
Microsoft .NET Framework: WPF with XAML and C#
Secure Programming for .NET
Software Development Fundamentals
Visual Studio 2017 First Look
Visual Studio Application Lifecycle Management
Visual Studio Code Cross-platform Code Editor
Visual Studio for New Users
Visual Studio Mobile Center First Look
Mobile Application Development
Android App Development Essentials
Android For .NET Developers
Apache Cordova
Application Development with React and Flux
Building Secure Mobile Apps
Developing Android Applications
Developing Apple Watch Applications
Ionic Framework
iOS 12 Application Development
iOS 12 Application Development
iOS Application Development Fundamentals
Java and .NET Programming for IoT
New Features in Android 5.x Lollipop For Developers
PhoneGap
Programming Cross-Platform Applications in Visual Studio with Xamarin
Programming with Kotlin
Reactive Programming with Redux
Titanium
Software Design
Domain-driven Design
JIRA Fundamentals
Object-oriented Design
Service Oriented Architecture
SOLID Principles of Object-oriented Design
TOGAF 9.1 Advanced
Software Development Principles
Advanced Scrum
Agile Software Development
Agile Software Testing
AI Development with TensorFlow
Building API Gateways
Clean Coding Techniques
Developing AI and Machine Learning Solutions with Python
Developing AI and ML Solutions with Java
EAI Patterns
Essential Deployment Microservices
Exploring Artificial Intelligence
Exploring Machine Learning
Exploring Microservices
Exploring the Future of UI/UX
Exploring Virtual Reality
Kanban Fundamentals
Microservices Architecture
Microservices Design Patterns
Pivotal Cloud Foundry Developer
REST API and Microservices
Software Practices (SCRUM)
Software Practices: Waterfall
The Full Stack Developer Mindset
User Experience (UX) Design Foundations
Using Docker for Java Microservices
Software Testing
Automated Testing with Selenium
Automation Using Appium
Debugging Fundamentals
Exploring Automation
Microsoft Visual Studio Team Foundation Server 2013 Administration
Software Testing Foundations
Software Testing Fundamentals
Software Testing with Cucumber
Software Testing with TestNG
Software Testing with Visual Studio
Team Foundation Server 2017
Testing Android Apps with Genymotion
Testing Social Media Applications
Testing with JMeter
Testing with JUnit
Using Jasmine in Testing
WebLOAD Performance Testing
Web Development Technologies
Ajax
CQRS Theory
Introduction to Ajax Development
Web Development Using the Yeoman Stack
  »   Web Design
Scripting and Web Languages
Advanced AngularJS
Advanced jQuery
Angular 4
Angular 5 Updates and Components
Angular 6 Development
Angular Reactive Programming
AngularJS 2.0
AngularJS and ASP.NET 5 MVC 6
AngularJS Fundamentals
Application Development with Node.js
Application Development with Node.js and the .NET Framework
Automating Tasks with Grunt
Automating Web Development Tasks with Gulp.js
Building Apps with jQuery Mobile
Building Apps with MEAN Stack
CSS3, Sass and Less
Developing with Kendo UI
Express 4.x Fundamentals
JavaScript - Ember.js
JavaScript - JsRender
JavaScript - Knockout
JavaScript Frameworks and Libraries
JavaScript Front End Development
JavaScript Sencha
JavaScript Single Page Apps
Javascript: Backbone.js
jQuery
jQuery Essentials
Responsive Apps with Bootstrap
TypeScript Essentials
Underscore.js
Using the LoopBack Node.js Framework
Web Application Frameworks
Creating Web Applications with Sinatra
Building Dynamic Web Sites with LAMP Stack
PHP Applications with the Zend Framework
Web Design
Responsive Web Design
Using Balsamiq
Using Justinmind
Web Accessibility Fundamentals
Web Design Essentials
Web Services
Apache Web Services
Apache Web Services with Tomcat
REST API