Course Catalogue
Below is a complete list of all courses grouped by curriculum. All courses are self-paced and can be taken at anytime and in any order. There are no schedules and you may take courses multiple times within your contract period. Courses and assessments are accessed by students online 24/7 via our dedicated training platform, MyInterskill. In addition to these courses, we also offer assessments, Learning Plans and guidance by one of our Learning Consultants. The entire package of courses, assessments and learning plans is offered as a bundle for one low price per student. We do not sell individual courses. Be sure to check out our coming soon courses and recently released courses, which are also included with your purchase.
IMPORTANT NOTICES: Please be aware we recently retired several curricula. Click here for full details on course retirements. Courses marked with "★" are available to clients with Enterprise licenses only.
Course Title | Duration | Description |
![]() |
5 | The Assembler Introduction course discusses the basics of mainframe assembler programming covering number systems, architecture, instructions, syntax and addressability. |
![]() |
7 | The Assembler Instructions course describes how to code instructions which will perform: arithmetic calculations, data comparisons and branching. Details of various Assembler linkage conventions and how they are used are also discussed. |
![]() |
5 | The Assembler Macros course describes the syntax and coding required to create an Assembler macro. The course also looks at the function of several system macros that are available for use. |
![]() |
8 | The Assembler Programming course addresses advanced programming techniques, discussing topics dealing with re-entrant programs and programs that utilize access registers to address data spaces. This course also looks at the interpretation of program listings. |
![]() |
5 | The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution. |
![]() |
4 | The z/OS Assembler course covers introductory concepts, Instructions, z/OS Architecture, etc. It instructs the student on programming using assembler language mnemonics, provides a machine code specific introduction to the z/OS architecture and covers number systems and program compilation / execution. |
Course Title | Duration | Description |
![]() |
4 | The Blockchain Technologies course provides you with a solid understanding of the business issues surrounding the emergence of blockchain, explaining its value and general structure. It then describes applications that are currently using this technology and provides an insight into its potential. For those just starting out, it suggests existing frameworks and platforms where blockchain can run, and because blockchain is still in its infancy, where more information of this topic can be obtained. The last module covers the more technical aspects of blockchain, discussing the use of hashes, block content, and how blockchain data is created and distributed throughout the network. |
Course Title | Duration | Description |
CONTROL-M Series |
||
3 | The Introduction to Control-M for z/OS course begins by describing the need for workload scheduling, introducing BMC Control-M for z/OS and describing its general function. It then looks at how this product is accessed using a traditional 3270 interface, as well as the Control-M EM GUI. | |
4 | The Defining and Scheduling Jobs Using Control-M for z/OS course works through the process of creating definitions used to schedule jobs. It begins by introducing the concept of calendars, and describing how various types of calendars can be created. It then jumps to the actual job definition, describing how it can be used to provide diverse scheduling requirements. Automated actions performed following job completion are also discussed. The final module delves into the use of system and user-defined variables and describes how they can be used to dynamically modify JCL submitted from a Control-M job definition. | |
4 | The Monitoring and Managing Job Processing course describes how jobs are monitored using the Active Environment screen, looking at job statuses and commands used to manipulate jobs. It then turns to the monitoring and management of other Control-M components, including the log, conditions, and control and quantitative resources. In the final module, an overview of the utilities that run automatically, and those that can be invoked manually, are discussed, as well as the types of reports that can be run, are covered. | |
MainView Series |
||
1 | This course introduces you to the architecture common to MainView products, discussing the function of several address spaces, and the Next Generation Logger. Following this, the MainView 3270 interface is examined, looking at its structure and commands that can be used to manipulate the screen content. Details describing how historical data is accessed is also provided. | |
1 | This course examines advanced MainView screen functionality such as hyperlinks and EZ Menus, which are used to quickly navigate between related MainView screens. Filtering and customization of screen data is covered in detail, highlighting options that can be used to more clearly identify specific data. |
Course Title | Duration | Description |
1 | This course provides the user with a broad overview of C/C++ programming in the z/OS environment, providing examples of the types of z/OS subsystems that C/C++ programs can be used to interact with. Use of the IBM XL C/C++ compiler, and the role of the Binder are discussed when explaining how executable modules are created. The final section of this course discusses a number of z/OS features that C/C++ programmer need to be aware of when coding for the z/OS environment. |
Course Title | Duration | Description |
CA 1 Series |
||
5 | The CA 1® Tape Management - Using Tape Media course describes the use of the CA 1® Tape Management system, the online facility and its uses, and the standard daily maintenance processing required by CA 1. | |
5 | The CA 1® Tape Management - Identifying and Resolving Media Problems course describes the structure of the CA 1 Tape Management system, its chaining process, AIVS and tape stacking facilities, problem determination, and the utilities available for correcting structural problems and reporting. | |
CA OPS/MVS Series |
||
5 | The CA OPS/MVS® Event Management and Automation - Overview, Components, and Features course explains the need for system automation in today's enterprise environment and describes the role of CA OPS/MVS. An introduction to of OPSVIEW panels and OPSLOG is also provided. | |
5 | The CA OPS/MVS® Event Management and Automation - Rules and OPS/REXX course describes how automation rules are defined and used in event automation, and how the EasyRule facility can be used for this purpose. An introduction to the CA OPS/MVS REXX interface and the associated commands, variables and functions that can be referenced, is also provided. | |
5 | The CA OPS/MVS® Event Management and Automation - Automating Events Using the Relational Data Framework course discusses the use of relational database tables and SQL to build event automation. | |
5 | The CA OPS/MVS® Event Management and Automation - Automating Events Using the SSM course describes how the System State Manager (SSM) is used to create relational tables used for event automation purposes. The testing of event automation using SSM is also discussed. | |
4 | The CA OPS/MVS® Event Management and Automation - Schedule and Group Managers for Event Management course introduces the Schedule Manager and explains how it is used to manage automated events. The function of the Group Manager and its role in managing automated events is also discussed. | |
CA 7 Workload Automation Series |
||
4 | This course introduces the learner to the CA 7 environment and its structure. It describes the methods used to schedule a job and explains how jobs progress through the CA 7 system. A description of initialization parameters used and how they can be invoked at CA 7 startup are provided along with CA 7 general access and navigation instructions. | |
6 | This course describes job attributes required when defining a job in CA 7 and explains how CA 7 keeps track of data sets used by jobs under its control. The Date/Time and Event driven scheduling methods are discussed thoroughly along with manual methods used to run ad-hoc jobs under CA 7. | |
6 | This course describes techniques for monitoring CA 7 job throughput and the functions that can be applied to jobs residing on Request and Ready queues. Commands used to forecast workload demands are explained and advanced manipulation of CA 7-managed JCL using CA Driver procedures and global variables are provided. The use of virtual resources to control job submission is also covered along with CA 7 job documentation processes. | |
4 | This advanced course describes how communication with CA 7 is possible using various interfaces and then focuses on the management and performance aspects of CA 7 using workload balancing macros and reporting. | |
5 | This advanced course covers the types of backup and recovery options, techniques and products that are available to CA 7. It looks at defining attributes associated with CA 7 disaster recovery mode and how some automatic recovery can be configured. Preventing and resolving common CA 7 issues is also provided. | |
CA 11 Workload Automation Series |
||
4 | The Workload Automation Restart Option for z/OS Schedulers Overview course introduces the components, functions, and capabilities of CA 11, and describes how job information is stored and processed by this product. | |
4 | This course looks at the interaction that users have with CA 11 in order to determine the status and attributes of job information stored in the CA 11 database. It also identifies how CA 11 data can be used for generating reports. Common online commands and batch generation programs are discussed in detail, while the last module focuses on possible CA 11 problems and resolution and includes an overview of backup and recovery strategies associated with CA 11. | |
CA Endevor Change Manager Series |
||
6 | The CA Endevor™ Software Change Manager Introduction and Basic Usage course provides an overview of change management practices and describes the role that CA Endevor SCM plays. A general description of CA Endevor SCM configuration defaults is provided along with details of foreground and batch processing tasks that can be performed. | |
5 | The CA Endevor™ Software Change Manager Package Processing and Facilities course describes the purpose of packaging and how it is performed in foreground and batch modes. A comparison of functions available using CA Endevor SCM Quick Edit and the CA Endevor SCM ISPF Interface is discussed. The Query facility is also described, along with how to use the Automated Configuration Management data. |
Course Title | Duration | Description |
CICS Transaction Server Operations 5.6 Series |
||
![]() ![]() |
4 | The CICS TS - CICS Transaction Server Introduction course provides an overview of the CICS Transaction Server product and how it is used to process work. A description of the components that comprise CICS TS and how they are integrated. |
![]() |
3 | This course describes how to access a CICS TS system using CICS Explorer, and how the CICS Explorer window can be modified to display various CICS TS data. Details describing how CICS Explorer help can be accessed, and the creation and integration of customized help is also covered. |
![]() |
6 | The CICS TS - Controlling CICS Transaction Server Operations course focuses on CICS startup and shutdown processes and commands, and the handling of system-related CICS problems. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating CICS resources, and starting/stopping CICS. |
CICS Transaction Server Programmers 5.6 Series |
||
![]() |
6 | The CICS TS - CICS Programming Basics course provides an overview of the CICS Transaction Server product and describes how it is used to process work. It looks at the application code required for programs working with CICS, using various programming languages. It also describes the major interfaces used to interact with this product. |
![]() |
6 | The CICS TS - Program Control and Communication course describes the methods used to transfer data from one CICS program to another, and the commands used to achieve this. It also explains the various CICS communication facilities and features that can be used for interaction between CICS programs and other programs: both within and external to CICS. This course also introduces the CICS programmer to more basic CICS issues including serialization, threadsafe, containers, and CICS data areas. |
![]() |
4 | This course discusses how CICS applications can be used to access and update data, and also looks at the code and interfaces required by CICS to communicate with Db2. |
![]() |
4 | This course looks at some of the features provided by CICS for application programs, including; storage, temporary storage queues, and transient data queues. |
![]() |
4 | This course discusses the options available to programmers when there is a need to connect to CICS using web-based interfaces. It addresses the HTTP, SOAP, and JSON protocols and the code required to send and receive requests from them. |
![]() |
3 | This course looks at the CICS Transaction Gateway product, describing when and how it is used to facilitate communication with CICS. |
![]() |
6 | The CICS TS - CICS Terminal Communications course looks at traditional CICS communication methods with terminals, and expands this further by describing how Basic Mapping Support (BMS) maps are created and used in today's environment. |
![]() |
2 | This course provides you with an overview of the SDF II product and describes how it is used to create BMS maps. |
![]() |
3 | This course addresses how CICS code, and general CICS system facilities can be configured to handle errors, and perform recovery. |
![]() |
4 | The CICS TS - Debugging CICS Programs course looks at several different CICS supplied transactions and system facilities that can be used to identify, and diagnose problems. The CEMT command is discussed in length, providing examples that show how CICS resource details are displayed and updated. The invoking of CICS debugging transactions and interpretation of results is covered, as well as the use of system dumps and traces. |
Course Title | Duration | Description |
![]() |
2 | The Coaching and Mentoring for Technical Specialists course begins by explaining how learning has evolved from the traditional on-the-job and classroom training, to a myriad of learning resources to suit a wide range of people. Coaching and mentoring are introduced, describing how they differ and the benefits they can provide. These items are then discussed in more detail outlining various coaching and mentoring models, and how they can be implemented and managed. Several scenarios involving technical coaching and mentoring are presented, allowing you to relate to how these types of programs can run in your environment. |
Course Title | Duration | Description |
![]() |
3 | This course provides an overview of cloud computing concepts including key characteristics, cloud services, and cloud deployment models. It discusses the mainframe’s role in cloud computing and then looks at the future developments around cloud computing. |
![]() |
3 | This course looks at cloud architecture and what technologies and methods are utilized to develop and deploy modern cloud applications. |
1 | This course provides an overview of the security measures that need to be considered when implementing an organization’s cloud environment. It discusses the importance of security and compliance, and highlights some of the tools and security mechanisms that can help ensure an organization’s data integrity and security is maintained. |
Course Title | Duration | Description |
![]() |
6 | The COBOL Programming Basics course introduces the COBOL language and its basic structure. It describes the syntax and use of program logic statements in the procedure division of a COBOL program. It examines the standard loop and conditional statements, and the available arithmetic operations. It also describes the use of basic screen and printing instructions. |
![]() | 4 | The COBOL Data and Datafile Definitions course explains how the COBOL programming language describes and defines data. It also shows how COBOL data definitions can be used to manipulate the way data is used. It explores display and computational formats, and the use of redefines to reference data in different ways. |
![]() |
6 | The COBOL File Handling course describes how COBOL can be used to define and process several of the common file types used in system processing. It details how sequential and direct files can be defined in the environmental division of the program, and the instructions and processes used to access data sequentially and directly through an index. |
![]() |
5 | The COBOL Programming - Advanced course examines the use of tables in a COBOL program, and the methodologies used for file sorting. It details the use of subprograms and the linkage section. It also shows how parameters are passed to a program. |
![]() |
4 | The COBOL - IBM Enterprise COBOL 6.3 for z/OS course is designed for learners with a basic understanding of generic COBOL who need to extend its use to the z/OS environment. It describes how COBOL programs are made available through compile and bind processes and discusses coding and options specific to the z/OS environment. The use of IBM's Language Environment is presented, and a number of coding techniques used to improve the performance of COBOL running on z/OS, is also shown. |
![]() |
3 | The Accessing IMS Databases from COBOL course details COBOL accesses the IMS/DB database. It gives examples of the DL/I data access language and shows how to use DL/I in COBOL programs to read and update IMS data. The concept of backup and recovery, particularly in the context of batch programming runs, is also explained. |
Course Title | Duration | Description |
![]() ![]() ![]() |
1 | This course begins by discussing the evolution of encryption, describing its importance, benefits and how pervasive encryption has only recently become a viable solution for organizations looking to meet data security requirements and compliance regulations. Major components of the z14 infrastructure are provided, describing how at-rest, and in-flight data associated with those components supports new and existing encryption capabilities. |
![]() | 1 | This expert video series introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. Finally, some best practice for determining which data you should encrypt is presented. |
Course Title | Duration | Description |
![]() |
4 | This course is designed to introduce and guide the user through the three phases associated with big data - obtaining it, processing it, and analyzing it. The Introduction to Big Data module explains what big data is, its attributes and how organizations can benefit from it. It also provides a snapshot of job roles, and available certification and training, in order to forge a career in big data. |
4 | This course is designed for those working with organizations looking to implement Machine Learning solutions. It is also of benefit for those looking to implement Spark on z/OS. It begins by explaining what Machine Learning is, how it works, and how organizations can benefit from it. The course then focuses on IBM's Machine Learning for z/OS solution, describing its features and components. In the final course, a description of Apache Spark and how it is used in a Machine Learning solution on a z/OS system, is presented. |
Course Title | Duration | Description |
Db2 Operations Series |
||
![]() ![]() ![]() |
5 | The Db2 Fundamentals course describes what Db2 is, how it is used and the components that comprise its structure. An overview of the SQL language, which is used to communicate with Db2, is provided along with details on how it is used with SPUFI. |
![]() |
4 | The Managing Db2 Operations course looks at Db2 from an Operations viewpoint, describing Db2 startup and shutdown, common operator tasks, message interpretation and restart and recovery considerations. A number of commands used to analyze the status of Db2 components are discussed as well as the facilities associated with backup, recovery and restart. |
Db2 - Database Management System Series |
||
![]() |
4 | The Introduction to RDBMSs and Db2 course describes from a Database Administrator's (DBA) viewpoint how Db2 is used and the types of Db2-related tasks that the DBA performs. The course also looks at Db2's system configuration requirements and how it is implemented in a z/OS environment. |
![]() |
6 | The Manage Data Definitions with Db2 course describes how SQL is used to define a Db2 database and its associated objects. It looks at SQL statement syntax and the methods used to invoke SQL statements. |
![]() |
4 | The Db2 SQL Fundamentals course looks at some of the more common SQL statements used by programmers when starting out. It addresses the code used to obtain Db2 table data, sort it, as well as methods used for inserting, deleting, updating and merging table data. |
![]() |
4 | The Advanced Db2 SQL course discusses some of the more advanced SQL code used to manipulate table data. Various methods used for joining tables is presented, along with examples of SQL statements and subqueries used to filter data results. |
![]() |
6 | The Create and Maintain Db2 Programs course describes how SQL is invoked from an application program and the interaction that can occur between the application program and Db2. This course also discusses how a Db2 COBOL Program is created. |
![]() |
3 | The Db2 Stored Procedures course describes how stored procedures are used and the platforms on which they can be implemented. The benefits derived from using stored procedures are discussed as well as security implications associated with them. |
![]() ![]() |
5 | The Optimize Db2 Application Performance course describes the methods used by Db2 when processing application programs containing SQL, and provides details of the tools and utilities that can be used to measure and analyse their effectiveness. |
Course Title | Duration(Hours) | Description |
![]() ![]() ![]() |
3 | This course describes how data center storage has evolved and its future in this environment. It then focuses on the hardware and software that comprises today's disk systems and how this meets the need of the data center. |
![]() ![]() ![]() |
3 | This course discusses how tape usage in data centers has evolved and looks at the purpose of this medium in today's environment. An overview of tape storage capabilities is discussed before looking at the emergence of virtual tape and how it is either replacing traditional tape systems, or working with them, to meet the data storage demands of the enterprise. |
![]() |
4 | This course provides an overview of network storage configurations and the monitoring and management tasks associated with the Storage Administrator role are also discussed. |
![]() |
5 | This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment. |
![]() |
3 | Initial content discusses space administration needs looking at data center backup and migration requirements, and then showing how this is achieved using DFSMShsm. The management of tape volumes and labels using DFSMSrmm is also covered in detail. |
Course Title | Duration | Description |
![]() |
5 | The DevOps - Introduction to DevOps in the Workplace course begins by discussing traditional software development and deployment, and how DevOps can be used to improve this process. A holistic view of DevOps is broken down to its core components describing the people and processes involved with each phase. The continuous DevOps integration, delivery, and deployment phases are explained along with common release management deployment techniques. An overview of the types of monitoring and reporting required to measure the effectiveness of DevOps practices is also provided showing how it feeds back into the DevOps cycle. |
1 | The Agile Fundamentals course discusses the business value of adopting an Agile philosophy, introducing a real-life software development project, and describing how Agile is used to restructure traditional software development and deployment tasks. The values and principles associated with the Manifesto for Agile Software Development are explained, while an overview of common frameworks used to adopt Agile philosophes is provided, along with their benefits. Additional Agile training, accreditation, and related supported products and practices are also mentioned throughout the course. |
Course Title | Duration | Description |
![]() |
3 | This course begins by immersing the learner in a full scale disaster, getting them to think about all the elements involved in not only recovering data, but also ensuring that the overall business runs as per expectations. It then describes what business continuity is, citing well known events, and where disaster recovery fits in. The course is then extended to explain common business continuity strategies and looks at standards, in particular ISO22301, to see how current standards tackle this important facet of business life. |
Course Title | Duration | Description |
4 | This course introduces the programmer to the IBM Developer for z/OS (IDz) product describing its purpose and features, how it is installed, and access to resources on a host system. | |
4 | This course describes the methods used to create, manage and maintain applications under IDz. It provides details on the benefits of projects and subprojects within IDz and the application tasks that can be performed within this structure. IDz testing and debugging capabilities are discussed in detail, in particular the ZUnit testing framework, and the IBM z/OS Debugger. The final module addresses the IDz features that allow you to create applications for Db2, CICS, and IMS. |
Course Title | Duration | Description |
![]() | 2 | The IBM Explorer for z/OS (also known as z/OS Explorer) course discusses the evolution of this product and how it fits into IBM's strategy of producing powerful modern looking tools that can be used easily by both experienced and entry-level personnel. The product's eclipse-based framework is discussed in detail with considerable emphasis on the use of the Remote System Explorer (RSE), z/OS and Resource perspectives, and the related views used to display and manage z/OS data. |
Course Title | Duration | Description |
![]() ![]() |
5 | The IBM Mainframe Communications Concepts course provides an overview of traditional SNA and TCP/IP communication protocols and the logical and physical components associated with them. |
![]() |
5 | The VTAM commands course discusses the use of commands to display the status and attributes of VTAM resources. An explanation of the processes used to start, activate, deactivate and stop VTAM resources is also provided. |
![]() |
5 | The Mainframe TCP/IP Commands course describes how TCP/IP runs on the mainframe and provides several scenarios where TCP/IP daemon, client application and server application commands are used. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and managing VTAM. |
Course Title | Duration | Description |
![]() ![]() |
3 | The Introduction to Mainframe Performance course provides the learner with a core understanding of what performance measures are required when managing a mainframe environment. Measuring the usage of critical resources is discussed, and potential issues that can affect the performance of tasks running in a z/OS system are presented. |
![]() |
3 | In this course you will examine the I/O process and see how I/O performance problems are detected, and the metrics used to determine where a problem may exist. Methods used to improve I/O performance are also discussed. Following this, an introduction to z/OS capacity planning is presented, describing the data required to identify future system growth and tips that can be used to better utilize existing resources before considering hardware or software purchases. |
![]() |
2 | In this course you will discover how SMF is used to capture important system activity and store it as specific record types. You will see how these records are structured and the utilities used to convert their content into a readable format. Commands used to display, configure and manipulate SMF are covered, as well as the process of archiving SMF records and creating your own SMF records. Following this, an introduction to software licensing is presented, describing common licensing models and the metrics they use to determine the cost to the customer. This information will assist the user in determining ways to minimize software licensing costs. |
![]() |
3 | The Z Performance - z/OS Workload Manager course provides the learner with steps describing how WLM components are created and linked, to form a WLM policy. The course then progresses to discussing in detail various workloads and the goals and importance that should be assigned to them. This is followed by an overview of performance information that can be obtained through SMF records, MVS commands, and SDSF. |
Course Title | Duration | Description |
4 | This course provides the learner with basic information about IBM MQ, initially describing how it is used and then branching out discussing its features. A detailed breakdown on IBM MQ components and their structure are provided, providing you with an overview on how it could be configured in your environment. Finally, the use of IBM MQ in a z/OS environment is covered with details on how it differs from other platforms. | |
![]() |
6 | This course begins by describing IBM MQ, and its common deployment options, and then is expanded to show how an IBM MQ queue manager is created. Various commands used to interact with MQ components are discussed throughout the remaining content, showing how definitions are created and displayed, and modifications that can be made to them. A focus on the security of MQ resources and authentication required to access them, is also presented. |
![]() |
4 | This course looks at the differences between traditional MQ, and how it is implemented and run in a z/OS environment. It discusses the use of z/OS datasets and files that need to be created as well as the procedures used to enable MQ in z/OS. You will see how traditional MQ commands map to z/OS, and how MQ resources are managed using z/OS online facilities and batch utilities. Security for MQ resources on z/OS is examined along with tools and utilities used for monitoring aspects of MQ performance. |
4 | This course begins by identifying the basic programming code used by applications to interact with IBM MQ. It describes the MQ messaging process and then delves more heavily into the commands that can be used to get and put MQ messages, and manage MQ objects. Details on programming with MQ in a z/OS environment is provided, explaining core differences when using that platform. |
Course Title | Duration | Description |
![]() |
5 | This course is designed to provide a system administrator with no prior AIX experience an introduction to the background and the fundamental components of AIX. The course covers essential knowledge including concepts, system access and management, and commonly used administrative commands. |
![]() |
6 | This course is designed to provide existing UNIX administrators a path to understanding the critical differences with AIX. Topics examined include the essential components of AIX, system management, performance improvements, and AIX system troubleshooting. |
![]() |
4 | This course is designed to provide the learner with an understanding of the tasks involved in creating and managing a virtualized AIX environment, and assumes the learner has a basic understanding of AIX. Topics covered include the fundamentals of virtualization in AIX environments, an examination of the Virtual I/O Server, and the use of management devices such as the HMC, IVM, or SDMC. |
Course Title | Duration | Description |
IBM i Fundamentals Series |
||
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
5 | The IBM i Fundamentals course explains the origins of the IBM i system and describes the configuration of hardware and software needed to support it. It discusses the types of devices that can be used to access the IBM i system and the interfaces most commonly used. Examples are also provided of several products commonly used to perform IBM i administration tasks. |
![]() |
5 | The IBM i Fundamentals Series provides learners with an introduction into IBM i from an operations point of view. The courses will familiarize you with the IBM Systems Director Navigator for i, IBM i navigator, and 5250 emulation interfaces and provide examples of some of the tasks that can be performed using them. |
![]() |
5 | The Monitoring and Managing IBM i Workloads course provides an overview of the processes involved in monitoring, managing and controlling IBM i workloads and printing. |
IBM i System Administration Series |
||
![]() ![]() ![]() ![]() |
4 | This course introduces the learner to the core tasks performed by the IBM i System Administrator, and includes information on system configuration, security, backup, recovery, performance monitoring and capacity planning. The use of third-party and IBM products to achieve these tasks is also discussed. The Management Central software, which is used to monitor and control IBM i system activity and performance is also explained in detail. |
![]() |
4 | This course focuses on the security-related tasks undertaken by the IBM i System Administrator. As well as discussing how overall security requirements are identified, it also delves deeper to describe how IBM i system security relating to user, system and resource components are created and managed. An overview of IBM i system auditing requirements, implementation and reporting is also provided. |
![]() |
5 | This course highlights the importance of IBM i system journaling and describes the type of data that can be captured using this feature. Tasks associated with displaying journal entries, implementing journals, managing journal activity, and recovering data from journals is discussed in detail. |
![]() |
3 | This course provides an overview of the levels of disk storage that are available on an IBM i system and how they can be configured for use. Information relating to speed, availability and data recovery features associated with IBM i disk storage are also discussed in detail. |
![]() |
4 | This course looks at logical partitioning and the benefits that can be gained from implementing this feature on your IBM i system. Details of the products that can be used to define partitions as well as the process itself is provided, and the management and performance of partitions is also discussed in detail. |
IBM i Programming Fundamentals Series |
||
![]() |
8 | The CLP - Control Language Programming course introduces programming that uses the IBM i Control Language (CL). It explains how to use the variables utilized in a CL program and control its processing. |
![]() |
4 | The CLP - Control Language Programming Functions and Messaging course describes the more advanced features of Control Language programming. It focuses on how to use CL message handling to monitor the correct execution of CL programs. |
IBM i RPG Series |
||
![]() |
6 | The RPG/400 - Introduction explains the fundamental features and structure of a Report Program Generator (RPG) program. It also describes the concepts of RPG programming. |
![]() |
4 | The RPG/400 Coding course explains the fundamental Report Program Generator (RPG) operation codes that enable programmers to manage field values, perform numeric operations, and manipulate dates for retrieval and viewing. |
![]() |
4 | The RPG/400 Programming course explains how to use Report Program Generator (RPG) features to write reports. It also describes structured programming and how to affect the flow of control. |
![]() |
5 | The RPG/400 Workstation Programming Introduction course shows how to design and develop screen layouts and how the program can interact with the user to deliver and accept data. |
![]() |
6 | The RPG/400 Advanced Workstation Programming course shows how to use the standard IBM i tools to write and compile RPG/400 programs. This course also covers the design and use of dynamic databases in your program. |
IBM i Query Series |
||
![]() |
4 | The Query - Database Basics and the Need for Query course describes the IBM Query for i sort, report and analyze capabilities providing examples on how IBM Query for i is used to create business reports. Basic concepts relating to database structure and the data that can be accessed by IBM Query for i are explained in detail. |
![]() |
6 | The Query - Creating a Simple Query course begins by describing how database files are joined, enabling IBM Query for i to more easily reference data. This is followed by the identification of data that will be required by IBM Query for i and the subsequent coding required to extract that information. Details on options used to save the query and print, or display, the resulting report are also covered. |
![]() |
6 | The Query - Advanced Query Features and Management course begins by looking at more complex capabilities associated with query definitions. It then moves into the management of queries, explaining how queries can be copied, modified, deleted, printed and run. The Data File Utility and its purpose are discussed, and finally a number of tips when managing queries are provided. |
IBM i Application Programming Introduction Series |
||
![]() |
3 | The Introduction to Db2 for IBM i - Introduction for Programmers course introduces the two main Db2 file types, physical and logical files. It describes how to define and create them. |
Course Title | Duration | Description |
![]() ![]() |
1 | The Introduction to IBM Z System Automation course provides the learner with a basic understanding of what IBM Z System Automation is and how it can be used in today’s modern enterprise. The course begins with looking at some of the benefits the product provides in managing system resources through automation. The course also covers the various components that enable automation functionality. Finally, the course delves further into what tools are available for IT personnel to interact with use with IBM Z System Automation. |
![]() |
3 | The SA z/OS - IBM System Automation: Planning, Installation, and Customization course, takes the user through the steps required to install, and configure SA z/OS V4.2 onto their system. Initial content covers implementation considerations, and provides the learner with tools used in the planning and installation process. The configuration assistant section describes how some of these implementation tasks can be automated. The Customization Dialog module describes how this product is used to build an SA z/OS automation policy database. It guides the learner through the creation of database entries, to the compilation of the Systems Operations Configuration File, enabling it for distribution and use by an automated system. |
![]() ![]() |
3 | The SA z/OS - IBM System Automation: Operations course, focuses on the SA z/OS administration and monitoring tasks performed by operations and administrator personnel. Initial content looks at initializing SA z/OS, and describes start-up options that can be invoked for the automation manager and automation agent. Tasks that allow you to refresh automation configuration data, and enable automation through the use of automation flags, pacing gates and runmodes is also discussed. SA z/OS functionality that may unintentionally inhibit automation activity, and how these issues are resolved is also covered. |
![]() |
3 | The SA z/OS - Automation Definitions Introduction and Workshop course, begins by describing the key Entry Types that can be defined in an SA z/OS policy database, and their purpose. Following this, a workshop-style module provides you with hands-on exercises used to create an application, application group and related automation definitions. |
![]() |
4 | The SA z/OS - Advanced Automation and Reporting course, introduces the learner to some more advanced implementation and configuration possibilities focusing on end-to-end automation, and the automation of CICS, IMS, and Db2 environments. It also looks at various methods used to report on the policy database content, automation activity, and statistics produced by SMF relating to automation usage. |
Course Title | Duration | Description |
![]() ![]() |
3 | The Understanding How IBM Z Workload Scheduler Processes Work course discusses the need for workload scheduling in today's enterprise organization, and provides general information describing how IBM Z Workload Scheduler (formerly Tivoli Workload Scheduler for z/OS, or TWSz) processes jobs. |
![]() ![]() |
6 | The Monitoring and Managing the IBM Z Workload Scheduler Environment course describes how IBM Z Workload Scheduler (formerly Tivoli Workload Scheduler for z/OS, or TWSz) is used to monitor and manage batch processing flows. Details relating to job restart and recovery using this product, are also provided. |
![]() |
6 | The Scheduling with IBM Z Workload Scheduler course explains how JCL is configured for the IBM Z Workload Scheduler (formerly Tivoli Workload Scheduler for z/OS, or TWSz) environment and how job schedules are created. |
![]() |
4 | The Maintaining the Integrity of IBM Z Workload Scheduler for z/OS course describes the creation and modification of current plans and long-term plans and the backup and recovery associated with them. |
Course Title | Duration | Description |
IMS v15 Series |
||
![]() ![]() ![]() |
5 | The IMS 15 Introduction course provides a broad overview of IMS describing its purpose, strengths and weaknesses, functional components, and processing concepts. |
![]() ![]() |
4 | The IMS 15 Commands course explains the different methods in which IMS commands can be invoked and provides examples of commands used to display various IMS system activity. A detailed description of the IMS startup and shutdown process and the associated commands is also provided. |
![]() |
4 | The IMS 15 Databases course covers in detail how data is stored within an IMS database and describes how it is referenced and accessed from a number of different sources. Instructions describing how to create database definitions, allocate databases and components, are also provided. IMS backup and recovery strategies are discussed as well as the use of maintenance utilities used in day-to-day operations. |
![]() |
4 | This course describes how IMS Transaction Manager (TM) is used by application programs to communicate with an organization's database content. It describes how IMS TM processes messages and the types of requests it can receive from application programs. The student is then shown how to code an IMS program and prepare it for execution. Examples using COBOL, PL/I, C, and Pascal are provided. Details on how the completed program needs to be defined to IMS is covered, as well as the use of terminals and how they are configured for IMS TM use. |
Course Title | Duration (hours) |
Description |
![]() |
4 | This course examines what a mainframe is, why it has survived and the IT personnel that need to interact with it. It then discusses the basic hardware, software and networking components and the methods used to access and process data on the mainframe. |
![]() |
6 | This course provides the learner with a more in-depth view of the z/OS system and covers concepts such as virtual storage, system initialization and how system data sets and parameters can be modified in response to system and network issues. |
![]() |
6 | This course discusses the use of mainframe data sets and database files to store organizational data and examines the batch and online methods used to process that data. Widely used mainframe programming languages such as COBOL, PL/I, C++, REXX, CLIST and Java are introduced and a description of the Language Environment used to provide many of these languages with common runtime routines is presented. |
Course Title | Duration | Description |
![]() |
1 | This course is designed for Java programmers who need to port their skills and knowledge to Java in a z/OS environment. It explains how Java uses features associated with z/OS UNIX, and is supported by Java Software Development Kit. A step-through showing how Java programs are compiled and run in the z/OS environment confirms the similarities between this platform and other Java-enabled environments. You will also see how Java programs can be invoked from batch, CICS, IMS, Db2, and WebSphere. |
![]() ![]() |
3 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to understand Java and the the basic concepts of object orientation and how it is different from programming languages traditionally used for enterprise development. The student will require knowledge and experience of a procedural mainframe programming language, particularly COBOL, and of the z/OS environment. |
![]() |
7 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers who need to be able to use Java as an alternative language to COBOL and to use Java to extend enterprise systems to the Internet. Java structures are shown alongside their COBOL equivalent. |
![]() |
3 | This course is intended for experienced Mainframe Programmers, particularly COBOL programmers, or Java programmers new to the IBM enterprise environment who need to understand the following: the Java datafile and database access, I-O methods, the special requirements and facilities used to access the IBM Enterprise systems unique data storage facilities, to use Java beans as reusable objects and enterprise Java beans for accessing the facilities provided by enterprise systems. |
Course Title | Duration (hours) |
Description |
![]() |
3 | The Introduction to JCL course discusses the organization's need to run batch processing, describing the people that utilize it, and the types of tasks performed with it. It explains where batch job JCL can be stored and the tools that can be used to access it. From there the course moves into the structure of JCL, explaining the basic syntax requirements and the types of accompanying parameters. |
![]() |
4 | This course describes the purpose of commonly used JOB and EXEC JCL statements, and concentrates on the parameters encountered when working with these statements. |
![]() |
6 | The DD statement is the most often used JCL statement, responsible for defining the input and output resources required when running a program. This course describes the parameters required when dealing with existing data sets, and if needing to create new ones. It also looks at the coding for printed output and job sysout. |
![]() |
5 | The courses presented to date have concentrated on simple sequential and partitioned data sets. In this course you will look at other types of data that can reside on a mainframe, in particular VSAM data sets and z/OS UNIX files and how they can be accessed. You will also see the benefits of creating generation data sets and the JCL code used to create and reference them. The last module concentrates on placing data onto tape, providing some best practices when dealing with this medium. |
![]() |
3 | This course discusses the use of the traditional COND parameter to control step processing, and the use of the IF/THEN/ELSE/ENDIF construct as an alternative. New basic job scheduling capabilities are also discussed. |
![]() |
3 | This course looks at some advanced JCL capabilities including the storing of JCL code externally and calling it in the form of a procedure or an INCLUDE group. You will also see how symbols can be incorporated into JCL, and the benefits and flexibility they can provide. |
![]() |
3 | This course consolidates many of these and looks at general problem and resolution practices associated with batch job submission, resource allocation, and abends. JCL restarts are also discussed, identifying any processing clean-up that needs to be performed, and the methods used to rerun or restart your job. |
![]() |
1 | This course contains many JCL-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers a number of new areas of functionality associated with z/OS 2.2, 2.3, 2.4 and provides details on statements and parameters that have evolved over the last few years. |
Course Title | Duration | Description |
![]() |
5 | This course describes how and why JES2 evolved and introduces the major JES2 components, their purpose, and general terminology. A number of scenarios are presented that describe how JES2 devices are used, their possible statuses, and how jobs are processed. The final module discusses operational aspects associated with JES2 including how it is automatically and manually started and stopped, and commands that can be used when there are problems with these processes. |
![]() |
4 | This course describes the JES2 command syntax and provides numerous examples explaining the scenarios in which JES2 commands are used. After an initial overview of commonly used JES2 commands, modules focus on the commands used for displaying printer, initiator, and batch job attributes and status. |
![]() |
5 | This course builds from the previous and discusses some of the more commonly used JES2 commands used to manipulate initiator, printer resources and batch job activity. A focus on the JES2 commands associated with modifying batch job attributes as they progress through the JES2 queues is also provided. The display and management of network related JES2 components is also discussed. |
![]() |
5 | This course provides you with examples of common JES2 job-related problems and explains the process and JES2 commands that are used to display, analyze and resolve those issues. Detailed information relating to the function of JES2 checkpoints, their placement, and attributes is provided along with steps required to resolve problems associated with this resource. |
![]() |
5 | This course looks at JES2 initialization parameters used to define JES2 system resources and the subsequent JES2 commands used to display and resolve problems that occur with these items. The JES2 shutdown process is revisited in more detail, providing information on problem resolution techniques if JES2 cannot be shut down gracefully. |
![]() |
2 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating the JES2 subsystem and its resources. |
![]() |
.5 | This course contains many JES2-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4. |
Course Title | Duration | Description |
![]() |
3 | This course provides an introduction to the evolution of mainframe processing, which lead to the development of the job entry subsystem, JES3plus. Key concepts about JES3plus and how it manages system resources and workflow are covered along with details on who needs to interact with JES3plus regularly. |
![]() |
1 | This course gives system operators insight into JES3plus commands that are used in performing inquiries on jobs and devices, how to modify a job’s properties, and how to vary the status of devices. Also discussed are commands used to start and stop JES3plus and what start options can be used and when. |
![]() |
1 | This course provides learners with an introduction into how JES3plus is initialized at start up and how the initialization stream is used to identify system resources to JES3plus. Following on, the learner is shown what resources need to be defined to JES3plus such as spool data sets, checkpoint data sets, mains, storage, and buffers among others which are all vital to JES3plus’ processing functionality. |
![]() |
1 | In this course application programmers are shown how, through the use of job control language (JCL), JES3plus control statements can be used to provide special instructions to JES3plus to perform on their jobs during job processing. Also discussed is how deadline scheduling can be implemented to make the best possible use of available resources along with dependent job control which can be used to control the flow of jobs based on specific conditions. |
Course Title | Duration | Description |
![]() |
5 | The Introduction to Linux course provides you with an overview of the Linux operating system and describes how it is used in today's System z environment. Information on interfaces used to access the Linux environment and standard communication tools are also discussed. |
![]() |
5 | The Linux File System course describes the file structure within the Linux environment and explains how files are accessed, displayed and manipulated. Details of security measures in relation to Linux files is also provided. A number of general tasks associated with monitoring and managing the Linux file system are also discussed. |
![]() |
4 | The Editing with vi course describes how the vi Editor is used to open, and update text files. Editing techniques such as searching, filtering, finding, copying and replacing text is covered and some advanced material relating to the editor configuration and programming support is also provided. |
![]() |
4 | The Linux Shell Programming course describes the use of coding components such as variables, parameters, expressions, and functions that can appear within a shell script. Details relating to conditional execution and looping that can be programmed into the script is supplied along with the handling of script errors. |
![]() |
4 | The Linux Operations course describes the purpose of Linux Processes and explains how these activities can be monitored and managed. Information describing how to create Linux jobs and optionally schedule them to run is discussed along with other operational tasks relating to system logs and shell customization. |
5 | The Linux on IBM Z Fundamentals course discusses available Linux distributions for the IBM Z environment, its operational implementation, and the general monitoring and management of Linux. The final module provides an overview of the performance monitoring and management tasks performed by the Linux Administrator, and contains tips for best practice in these areas. |
Course Title | Duration (Hours) |
Description |
1 | This course introduces sampling-based performance tools such as Compuware Strobe, IBM Application Performance Analyzer, and Macro4 FreezeFrame, which are available for z/OS environments. It describes what these tools are, the information that they provide, and how this assists with application performance tuning. It includes information on the tools currently available, performance implications when using them, and how to minimize any impact they may have on the system. It also steps through how sampling sessions can be started, and the key parameters for such sessions. | |
1 | A general introduction to mainframe application performance. In this course, you will be introduced to the basic concepts of improving application performance by tuning. This course includes suggestions on when and why to tune, tuning for CPU vs service time, and also considers batch and online performance objectives. |
Course Title | Duration (Hours) |
Description |
![]() |
3 | This course describes how file transfer requirements have grown in importance over the years to the point where it has become an integral part of the daily workload processing. It then focuses on the elements of file transfer covering security aspects such as encryption and hashing algorithms as well as discussing the pros and cons of popular file transfer protocols. This knowledge is paramount when needing to manage and monitor a file transfer environment. The final part of this course discusses the common features associated with general Managed File Transfer (MFT) products, looking at tasks that need to be undertaken to ensure that compliance, internal regulations and SLAs are met, and that data integrity and security is maintained. |
Course Title | Duration (Hours) |
Description |
![]() |
3 | This course begins by describing how the Parallel Sysplex evolved and why it is integral component of today's enterprise IT environment. Its key features are discussed in terms of the benefits it provides to the organization - system availability, data integrity, workload and data sharing, and automated recovery to name a few. A break-down of the major Parallel Sysplex components is then presented, describing their importance and how they can be configured. |
Course Title | Duration | Description |
![]() |
5 | The PL/1 Fundamentals and Data Representation course introduces the PL/1 language. It explains the basic building blocks, particularly how data and program storage is represented and defined in the language. |
![]() |
5 | The PL/1 Program Design Techniques course builds on the PL/1 Fundamentals course. It explains how to build a structured program in the language. It also describes many of the common built-in functions. |
![]() |
5 | The PL/1 Accessing Data in Files course explains how to use PL/1 to access and update data in both sequential and random access files. It also describes how to handle file and generic error conditions. |
![]() |
5 | The PL/1 Debugging and Advanced Coding Techniques course explains the reasons for program errors and describes the tools available to debug a PL/1 program. It also explores some more advanced coding techniques in the language. |
Course Title | Duration | Description |
6 | The CLISTS Introduction course introduces the Command LIST (CLIST) interpreted language for the z/OS environment. It examines the commands and statements used by the CLIST language. It also shows how it can be used in conjunction with TSO commands and facilities to assist the general operations of z/OS. |
Course Title | Duration | Description |
![]() |
4 | The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program. |
![]() |
6 | The REXX Keyword Instructions course discusses the common keyword instructions used in REXX coding and describes how looping and execution control instructions are invoked. |
![]() |
6 | The REXX Built-In Functions course describes the standard built-in functions that are available with REXX. |
![]() |
6 | The REXX with z/OS and TSO/E course explains how REXX is used in TSO and z/OS environments. |
Course Title | Duration | Description |
![]() |
8 | The SDSF - Concepts and Operation course describes the purpose of SDSF, providing details on how it is accessed and how you interact with it. The course then explains how data is located and the use of filtering commands to display specific information. Details of SDSF initialization and shutdown are provided with solutions to common problems. Finally, a description of SDSF logs and how they are used is covered. |
![]() |
7 | The SDSF - Using SDSF to Control Job Processing course describes how job activity can be displayed using the Input, Display Active and Status SDSF panels. It discusses how the attributes of jobs including their status, can be modified by overtyping existing values, or by entering commands. Control of overall batch job activity through the use of MAS, Scheduling Environments and Initiators is also discussed. |
![]() |
6 | The SDSF - Using SDSF to Display, Manipulate and Print Job Output course describes how held and non-held output is displayed, and provides information on the commands that can be used to modify output attributes or delete the output altogether. Details associated with displaying and modifying printer attributes and activity are also covered. |
![]() |
6 | The Using SDSF to Manage System Resources and Devices course describes the use of the IBM Health Checker and explains commands that can be used to run, delete, restore, activate and deactivate a check. Displaying and interpreting JES2 resource data is covered along with the process of handling system requests and action messages. Details associated with displaying and managing spool, and JES2 node and line activity are also explained. |
![]() |
2 | This course contains many SDSF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4. |
Course Title | Duration | Description |
Introduction to Mainframe Security Series 2.4 |
||
![]() ![]() ![]() |
5 | This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered. |
RACF for z/OS v2.4 Series |
||
![]() ![]() ![]() |
3 | This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of usThis course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.er and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided. |
![]() ![]() |
4 | The “RACF - Defining and Managing Users in RACF” course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several interfaces. |
![]() ![]() |
3 | The “RACF - Managing RACF Groups and Administrative Authorities” course follows on from the “Defining Users to RACF” course describing how users can be connected to Group profiles and can be assigned special privileged access. |
![]() ![]() |
3 | The “RACF - Protecting Data Sets Using RACF” course describes how RACF is used to define access to z/OS data sets. Information on the profiles used to provide this access is also discussed in detail. |
![]() ![]() |
4 | The “RACF - Protecting General Resources Using RACF” course describes how RACF is used to define access to system resources such as DASD and tape volumes, load modules (programs), and terminals. Details of the profiles used to provide access to these items is also discussed in detail. |
![]() ![]() |
3 | The “RACF - RACF and z/OS UNIX” course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources. |
![]() ![]() |
3 | In the “RACF - Managing Digital Certificates” course you will see how encryption keys are used to securely manage data, and the standards that enforce encryption protocols. You will be introduced to various types of certificates and see how data that is stored in them. From a z/OS perspective you will see how IBM’s Digital Certificate Access Server (DCAS) provides password free access to that environment using a certificate. Commands used to generate and manipulate digital certificates, and keyrings is discussed in detail. |
![]() |
3 | The “RACF - For System Programmers 2.4” course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally. |
![]() |
4 | The “RACF - For Auditors” course describes the various types of data center audits and discusses the role of an internal auditor when performing a RACF audit. It expands this to look at the general steps to ensure that RACF managed security is aligned with both organizational security standards, and external compliance regulations. RACF auditor privileges are discussed in detail describing how audit information is stored and the commands used to request the capture of specific events. The type of data that can be unloaded from SMF, and the RACF database, is explained along with details on how ICETOOL can be used to process this information to create audit reports. |
CA ACF2 Security Server Series |
||
4 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
4 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. | |
5 | These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources. |
Course Title | Duration | Description |
4 | This course describes what Service Oriented Architecture (SOA) is and why businesses today are looking at implementing it. It outlines the components and architecture associated with an SOA environment and explains the challenges and barriers to SOA adoption. |
Course Title | Duration (hours) |
Description |
![]() |
5 | The Using Online System Facilities - TSO/ISPF course explains the purpose of TSO is and how it is accessed. It then describes how to log on to ISPF and provides details of navigation methods, program function key definition and explains how basic ISPF settings can be configured. |
![]() |
5 | The Managing Data Files and Definitions with ISPF/PDF course explains how to use the ISPF menu options to display the contents of Data Sets and how functions such as; copying, printing, renaming, and deleting are performed on these objects. |
![]() |
7 | The Maintaining Data in Files with the ISPF Editor course explains how the ISPF Editor is used to view, browse, and edit data within a data set. |
![]() |
2.5 | This course contains many TSO and ISPF-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4. |
Course Title | Duration | Description |
z/OS Batch Utilities Series |
||
![]() ![]() |
4 | This course looks at the IEFBR14, IEHPROGM and IEBCOPY utilities and discusses how they are used to create, copy, and delete data sets. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail. |
![]() ![]() |
5 | This course looks at the IEBGENER, ICEGENER, IEBCOMPR, IEHLIST and DFSORT utilities and provides real-life examples describing how they are used to interrogate and modify data set content. The JCL requirements for these utilities, along with their control statement syntax, is also covered in detail. |
![]() ![]() |
1.5 | This course contains many Utility-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4. |
Course Title | Duration | Description |
![]() |
6 | This course provides the learner with a basic understanding of the VSAM access method and VSAM data sets on z/OS. It introduces what VSAM is and when it is used. It includes information on the different VSAM data set types, when each is used, and their internal structure. Information on creating, copying, deleting, and managing VSAM data sets using JCL, TSO/E commands, the IDCAMS batch utility, and other tools is also covered. Finally, other products used to manage VSAM data sets are introduced - both from IBM and other vendors. |
![]() |
3 | This course explains how VSAM data can be configured, allowing it to be shared by jobs, TSO users, UNIX processes and started tasks. It also addresses recovery options available when VSAM data is shared. A detailed explanation of parameters affecting VSAM performance is covered as well as the types of utilities used to capture VSAM performance statistics. |
.5 | This course contains many IDCAMS utility tips, tricks, techniques, and best-practice items associated with VSAM data. |
Course Title | Duration | Description |
Version 7.1 | ||
![]() |
6 | The z/VM Concepts, System Initialization and Shutdown course describes how virtualization, and in particular z/VM, has become more popular in Data Centers and examines the processes used for z/VM start-up and shutdown. |
![]() |
5 | The Monitoring and Controlling z/VM Operations course describes the tasks associated with displaying z/VM system status and activity, and management of z/VM resources. |
![]() |
6 | The Managing Guest Operating Systems course describes the types of guests that can be installed under z/VM and the methods used to create, display and manipulate CMS files. |
![]() |
5 | The Identifying and Resolving z/VM Problems course looks at the tools and methods used to gather information that assists with problem resolution, and discusses how performance issues and general problems are resolved. The processes and utilities used for backup and recovery are also described. |
5 | The Linux on z Systems Fundamentals course discusses common Linux distributions for the z systems environment, how Linux is accessed, its operational implementation, and the general monitoring and management of Linux. The Administrator module provides an overview of the tuning, monitoring, and analyzing tasks performed by the Linux Administrator and contains tips for best practice in these areas. |
Course Title | Duration | Description |
3 | This course introduces Java, one of the most popular programming languages in modern IT and its extended version, Jakarta Enterprise Edition (Jakarta EE), which itself is another popular version of Java that has found its place supporting and running back-end enterprise applications. The course also introduces IBM’s WebSphere Server Application and how it serves in implementing Java/Jakarta EE services within an enterprise IT environment. | |
4 | In this course you are introduced to how Java works in a z/OS environment and some of the tools available. The course then introduces you to WebSphere Application Server for z/OS and WebSphere Application Server for z/OS Liberty and their key features. The course then looks deeper into how WebSphere Application Server for z/OS and its Liberty variant interact and work with z/OS resources. |
Course Title | Duration | Description |
![]() |
1 | This course describes how IBM Z hardware has evolved to cater for today's enterprise data processing needs. |
![]() |
5 | This course discusses current IBM Z enterprise, and LinuxONE, system models and their predecessors. It provides details on their components and their functionality. |
![]() |
1 | This course looks primarily at the Hardware Management Console (HMC) and provides an overview of the functionality and features of this product. It also discusses common HMC tasks and the authorization required to perform them. |
Course Title | Duration (hours) |
Description |
![]() | 7 | The z/OS Concepts and Components course describes the evolution of mainframe computing and provides descriptions of the major components that comprise today's z/OS environment. Details of general z/OS processing concepts are also provided. |
![]() |
4 | The Initializing and Terminating the z/OS System course describes what actions occur as part of a z/OS system initialization, and then delves into the system data sets and configuration libraries responsible for defining z/OS system characteristics. The final module in this course simulates a z/OS system startup and shutdown, describing the most common commands and operator responses. |
![]() |
5 | This course introduces z/OS commands that can be used to display the status and attributes of various z/OS tasks and devices. An overview of system monitoring tools and facilities such as RMF, z/OSMF, traces and EREPS are also provided as well as a description on how SMF data is created and controlled. This course also discusses the need for message suppression and describes how this is achieved. |
![]() |
5 | The Identifying z/OS System Problems course explores some of the processes, commands, and tools that are used in identifying system problems. It describes how common system problems are recognized, and the steps that can be taken to assist with problem resolution, including dumps and analyzing the catalog address space. |
![]() |
5 | The Resolving z/OS System Problems course describes the processes and commands required to resolve common z/OS system problems. It also describes when cancel and force commands should be used and how to handle command flooding. |
![]() |
5 | The z/OS Architecture - Processing Workloads course describes how today's z/OS system processes workloads, focusing on the concepts of address spaces showing how they provide the environment under which tasks can run. You will look at the different types of CPUs that can be configured in a z/OS system and see how programs issue instructions to the CPU. Diving down deeper you will then look at the CPU chips themselves and view the components that comprise them, looking at their involvement in processing work. Finally, the major components that comprise the mainframe's I/O structure are presented to show how work moves throughout the z/OS environment. |
![]() |
3 | Processor storage, real storage, or central storage. Whatever you call it, it is the memory where z/OS programs and their data need to reside before they can be processed, and like other mainframe resources it can be virtualized. In this z/OS Architecture - Memory, Address Spaces and Virtual Storage course, you will see how the address spaces discussed in the previous course, access and free the memory they require to process work. You will also see how virtualization of this resource occurs, which for IT specialists will provide them with knowledge to troubleshoot memory-related issues. |
![]() |
2 | This course contains many z/OS-related tips, tricks, techniques, and best-practice items that you may find useful in your day-to-day activities. It covers several new areas of functionality associated with z/OS 2.3 and z/OS 2.4. |
z/OS Console Simulators Series |
||
![]() |
3.5 | A number of simulations are provided that the student can use to assess their skills and knowledge in relation to the entering of commands, and interpretation of output produced, when monitoring and manipulating MVS system resources. |
![]() |
.5 | Two simulations are provided that the student can use to assess their skills and knowledge in relation to the manual shutdown and start-up of a z/OS system. |
![]() |
3 | Ensuring that all of your organization's z/OS system software is current, and that any fixes and improvements have been applied, is paramount to maintaining system availability. This course looks at the SMP/E software and how it is used by the z/OS Systems Programmer to provide best practice installation, management and reporting of z/OS system software. |
Course Title | Duration | Description |
![]() |
3 | The z/OS Connect EE - IBM z/OS Connect Enterprise Edition course discusses the need for organizations to open up their mainframe data to cloud, mobile and web customers and describes how z/OS Connect EE provides this capability. The course also covers what IT specialists need to know on how resource access and data communication is performed by z/OS Connect EE. |
Course Title | Duration | Description |
![]() |
6 | This course provides the learner with a basic understanding of the z/OS Management Facility (z/OSMF). It begins with basic concepts: what z/OSMF is, why it is used, how it is configured, and first steps in logging on and using it. The course then delves further, providing the student with the skills needed to use all the z/OSMF features: problem management, configuration of WLM and TCP/IP, software management and deployment, capacity provisioning, performance monitoring, and workflow creation. |
Course Title | Duration | Description |
![]() |
3 | This introductory course looks at the evolution of UNIX on the mainframe and describes how it interacts with today’s z/OS system products. It provides an overview of the z/OS UNIX System Services major components and shows typical workload processing in this environment. Details of the various file systems that are supported under z/OS UNIX are explained along with scenarios on when they would be used. |
![]() |
4 | This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing. |
![]() |
4 | This course discusses commonly used interfaces to z/OS UNIX and then concentrates on common tasks and how they are performed within those interfaces. Interfaces covered include: OMVS Shell, ISPF Shell, ISPF’s z/OS UNIX Directory List Utility, and batch processing. |
Course Title | Duration (hours) |
Description |
![]() |
4 | The z/VSE Basics course discusses mainframe operating systems and identifies the types of organizations using z/VSE. It provides an overview of the z/VSE infrastructure describing the personnel likely to interact with it and provides examples of typical data processing on this system. |
![]() |
4 | The z/VSE for Operators course looks at z/VSE from an Operations viewpoint, describing how they access the system and perform startup and shutdown processing. A description of common operator tasks, and the commands used to display, monitor, and resolve problems associated with the z/VSE system are also provided. |
1 | This course is designed for those working with organizations looking to implement Machine Learning solutions. It begins by explaining what Machine Learning is, how it works, and how organizations can benefit from it. |
Course Title | Duration (hours) |
Description |
![]() |
3 | The Zowe Fundamentals course begins by describing the features of Zowe, and the major components that comprise this product: Zowe Application Framework, Zowe Command Line Interface (CLI), Zowe Explorer, Zowe Desktop, and API Mediation. Examples show how users interact with these Zowe components and the advantages of using them. |
Non-Mainframe Subject Areas
Marketing Curriculum |
Essentials of Public Relations Marketing in the Digital Age |
Operations Curriculum |
Managing for Operational Excellence Operations Management: Efficiency of Production Six Sigma Black Belt (2015 BOK) Six Sigma Green Belt Six Sigma Yellow Belt Understanding Lean Production |
Strategic Planning Curriculum |
Fundamentals of Business Planning Strategic Risk-taking The Quality Management of Data Thinking Strategically and Managing Risk |
Big Data |
Apache Hadoop and MapReduce Essentials Apache Kafka Apache Solr Essentials Apache Storm Introduction Big Data – The Corporate Leadership Perspective Big Data – The Engineering Perspective Big Data – The Legal Perspective Big Data - The Marketing Perspective Big Data – The Sales Perspective Big Data – The Strategic Planning Perspective Big Data Development with Apache Spark Big Data Fundamentals Big Data Operations Data Modeling for Hadoop Designing and Implementing Big Data Analytics Hadoop Ecosystem Hadoop Operations Hadoop Installation and Maintenance IBM BigInsights Fundamentals |
Business Intelligence |
Business Intelligence with QlikView Microsoft SQL Server Data Warehousing and Business Intelligence Introduction |
Data Science |
Creating Real Time Dashboards Data Analysis Application Data Architecture: Getting Started Data Science Essentials Data Science Using R Deploying Data Tools for All Users Enterprise Governance Strategies Getting Started with Hive Implementing Data Access and Governance Policies Microsoft Azure HDInsight MongoDB for Data Wrangling Perform Cloud Data Science with Azure Machine Learning Powering Recommendation Engines R for Data Science Statistics for Data Science #1 Statistics for Data Science #2 Streaming Data Architectures Working with HDFS |
Data Visualization |
Microsoft Power BI Tableau Data Visualization and Analytics |
Microsoft SQL Server 2016 |
Microsoft SQL Server 2016: Developing Microsoft SQL Server 2016: Provisioning Microsoft SQL Server 2016: Querying |
MySQL and No SQL |
Apache HBase Fundamentals Cassandra for SQL Developers MongoDB Development MySQL Database Development NoSQL RavenDB Fundamentals |
Oracle 12c |
Oracle Database 12c: Backup and Recovery Oracle Database 12c: Install and Upgrade Oracle Database 12c: Introduction to SQL Oracle Database 12c: New Features for Administrators Oracle Database 12c: Performance Tuning Oracle Database 12c: RAC Administration Oracle Database: 12c Administration Ed 2 |
Systems and Database Design |
Generic Design and Modeling Databases |
Microsoft Dynamics |
Microsoft Dynamics CRM 2013: Applications Microsoft Dynamics CRM 2013: Customization and Configuration |
Salesforce |
Developing Applications in Force.com |
SAP |
SAP Business One for End Users SAP Business Objects Business Intelligence |
Administrative Support Curriculum |
Finance and Accounting Curriculum |
Accounting for Non-Financial Professionals Cost Consciousness in the Workplace |
Human Resources Curriculum |
Effective Hiring Practices Professional in Human Resources Exam Prep Recruiting, Screening, and Onboarding Effectively SHRM- SCP: HRM for Senior HR Professionals SHRM-CP/SCP: Workplace Management and HR SHRM-CP/SCP: HR Competencies SHRM-CP/SCP: HR Strategy Management SHRM-CP/SCP: Management of People SHRM-CP/SCP: Organization and the HR Function Transformational HR and Talent Management |
Cloud Computing |
Amazon Web Services Solution Architect - Associate 2018 Amazon Web Services Solution Architect – Professional Architecting Microsoft Azure Solutions - 2018 Update Architecting on Amazon Web Services AWS Certified Developer - Associate AWS Certified SysOps Administrator – Associate AWS Essentials AZ-200: Microsoft Azure Developer Core Solutions Certified Cloud Security Professional (CCSP) Cloud Computing for the Business User Cloud Computing Technology Fundamentals CompTIA Cloud+ CV0-002 Design and Implement Cloud Platform Solutions Developing Microsoft Azure Solutions Engineering DevOps on Amazon Web Services Google Cloud Architect Google Cloud Platform Fundamentals Google Cloud SQL for Developers Google Data Engineer Google G Suite Administrator Implementing Microsoft Azure Solutions Managing Citrix XenDesktop 7 Solutions Microsoft SCCM 2012: Administering and Deploying OpenStack Fundamentals Serverless Architecture Using AWS Systems Operations on Amazon Web Services Virtualizing Enterprise Desktops and Apps |
Network Management and Security |
Software Defined Networking Essentials |
Security Solutions |
Certified Information Security Manager (CISM) - 2018 Update Certified Information Systems Auditor Certified Secure Software Lifecycle Professional (CSSLP) Certified Systems Security Professional (CISSP) COBIT 5 Foundation CompTIA Advanced Security Practitioner (CASP+) CompTIA Cybersecurity Analyst+ CS0-001 CompTIA PenTest+ PT0-001 Cryptography Fundamentals Cybersecurity 101 Exploring Security Trends Foundations of Android Security Foundations of iOS Security Microsoft Security Fundamentals - 2018 Update OWASP Top 10 Securing Mobile Devices in the Enterprise Securing User Accounts Systems Security Certified Practitioner Systems Security Certified Practitioner (SSCP) 2018 |
Social Networking |
Flickr for End Users |
Leadership Curriculum |
Creating a Positive Atmosphere Developing Leadership Skills Improving Leadership Skills Leading Virtual Teams Leveraging Leadership Techniques Organizational Awareness Performance Measurement Women in Leadership |
Management Curriculum |
Advanced Management Techniques Coaching to Drive Success Empowering Employees Final Exams First Time Manager Essentials Leveraging Key Management Techniques Managing a Multigenerational Workforce Managing Employee Performance Managing in Difficult Times Managing Technical Teams |
CompTIA |
CompTIA A+ 220-1002 CompTIA A+ 220-901 CompTIA A+ 220-902 CompTIA A+ Exam 220-901 CompTIA A+ Exam 220-902 CompTIA Linux+ 2014 Powered By LPI: LX0-103 CompTIA Linux+ 2014 Powered By LPI: LX0-104 CompTIA Server+ 2014 |
DevOps |
Automation with Terraform DevOps with Ansible and SaltStack Docker – Beyond the Basics Docker for Windows Server Elasticsearch Development Fundamentals of DevOps HP LoadRunner 12 Essentials Kubernetes and Application Containers Master DevOps with Puppet Mastering DevOps with Chef Mastering DevOps with JavaScript Mastering DevOps with Jenkins Mastering DevOps with Python Mastering DevOps with Splunk Mastering Docker for DevOps Performance Engineering PowerShell for Server 2016 RabbitMQ Shell Scripting Essentials Using Docker Using Vagrant Vagrant Development Environments |
Microsoft Exchange Server 2016 |
Server 2016: Install, Store, and Compute - 2018 Update Server 2016: Networking - 2018 Update |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2: Configuring Advanced Services Microsoft Windows Server 2012 R2: Designing and Implementing an Infrastructure Microsoft Windows Server 2012 R2: Implementing an Advanced Infrastructure Microsoft Windows Server 2012 R2: Installing and Configuring |
Office 365 |
Managing Office 365 Identities and Requirements |
VMware |
VMware Certified Cloud Associate VMware Certified Cloud Professional VMware NSX Network Virtualization VMware Overview VMware vSphere 6 Install, Configure, Manage: Part 1 VMware vSphere 6 Install, Configure, Manage: Part 2 VMware vSphere 6.5: Install, Configure, and Manage VMware Workstation 11 Fundamentals |
Windows PowerShell |
Microsoft PowerShell and Exchange Server Microsoft PowerShell and SharePoint Microsoft PowerShell and SQL Server Microsoft PowerShell for Windows Windows PowerShell Desired State Configuration |
Adobe, Graphic Design and Page Layout |
Adobe Acrobat Pro X1 Adobe Captivate 9 Fundamentals Adobe CC Overview New Features Adobe ColdFusion 10 Adobe Dreamweaver CC Adobe Edge Animate CC Adobe Flash Professional CC Adobe Illustrator CC Adobe InDesign CC Adobe Photoshop CC Adobe Premiere Elements 13 Adobe Premiere Pro CC Alternative versions available. |
Collaboration Tools |
Cisco Jabber 11.8 for Windows Cisco WebEx for Web Cisco WebEx for Windows Cisco WebEx Teams Confluence Web Convo Gmail Web Join.me for Windows LogMeIn GoToMeeting LogMeIn GoToWebinar |
Google AdWords Google Analytics Google Analytics for Web Google Apps Fundamentals Google Docs Google Drawings Google Drive Google Forms Google Hangouts Google Hangouts Meet Google Keep Google Photos Google Sheets Google Sites Google Slides Google Team Drives |
IBM for End Users |
IBM Notes 8.5 IBM Notes 9 IBM Sametime Connect 9 IBM Sametime Web Chat 9 IBM Verse 2016 |
Microsoft Office 2016 |
Microsoft Office 2016: New Features Microsoft Office 2016: Beginning Access Microsoft Office 2016: Beginning Excel Microsoft Office 2016: Beginning OneNote Microsoft Office 2016: Beginning Outlook Microsoft Office 2016: Beginning PowerPoint Microsoft Office 2016: Beginning Project Microsoft Office 2016: Beginning Visio Microsoft Office 2016: Beginning Word Microsoft Office 2016: Intermediate Excel Microsoft Office 2016: Intermediate Outlook Microsoft Office 2016: Intermediate PowerPoint Microsoft Office 2016: Intermediate Word Microsoft Office 2016: Advanced Excel Microsoft Office 2016: OneNote for iPad Microsoft Office 2016: PowerPoint Best Practices Microsoft Office 2016: SharePoint for End Users Microsoft Office OneDrive Outlook Mail for Web Skype for Business 2016 Alternative version available. Also available for iPad, iPhone, iOS and Mac. |
Microsoft Office 365 |
Microsoft Office 365 for Advanced Business Users Microsoft Office 365: Delve Microsoft Office 365: Excel Microsoft Office 365: Flow 2018 Microsoft Office 365: Forms Microsoft Office 365: Groups Microsoft Office 365: OneDrive for Business 2017 Microsoft Office 365: OneNote Online Microsoft Office 365: Outlook Microsoft Office 365: Planner Microsoft Office 365: PowerPoint Online Microsoft Office 365: SharePoint Online Microsoft Office 365: Stream Microsoft Office 365: Teams Microsoft Office 365: Word Online Microsoft Office 365: Yammer |
Microsoft Windows 10 |
Microsoft Windows 10 Fall Creators Update Also available: Microsoft Windows 8, 7, Vista, XP and earlier. |
Productivity Tools |
Box Circuit for Web 2018 Dropbox for Web Dynamics 365 for Sales Evernote 6 Freemind 1.0.1 Hootsuite JIRA Fundamentals Jive-n Cloud 2018 Microsoft Power BI Microsoft To-Do for iOS MindManager 2016 Pocket for Web Prezi Classic Salesforce Chatter Salesforce Chatter for Lightning Salesforce Lightning Scoop.it for Web Slack 2016 Smartsheet 2018 Tableau Data Visualization and Analytics Trello |
Social Networking Tools |
LinkedIn for Web Pinterest for iOS Pinterest for Web Tumblr for Android Tumblr for iOS Tumblr for Web Twitter for iOS Twitter for Professionals Twitter for Web YouTube for Web |
Communication Curriculum |
Communicating Internationally Communicating Tactfully and Diplomatically Communicating with Senior Executives Cross-Cultural Communication Dealing with Workplace Conflict Developing Effective Negotiation Skills Developing Your Listening Skills Effective Business Meetings Effective Business Writing Effective Communication Essential Skills for Professional Telephone Calls Getting Results through Personal Power Making the Most of Your Presentations Managing and Controlling Anger Note-taking Skills Practical Grammar for Business Writing Skills for Communication Success Storytelling Basics The Art of Feedback Using E-mail Effectively in the Workplace Working with Difficult People Writing a Business Case Writing Skills for Technical Professionals |
Personal Development Curriculum |
Building, Rebuilding and Sustaining Trust Business Ethics Essentials Creating Lasting Organizational Change Creativity in the Workplace Dealing with Setbacks Developing Your Critical Thinking Skills Digital Economy Skills Discovering Your Strengths Diversity on the Job Facing Problems and Making Decisions Growth Mindset Improving Your Memory Improving Your Personal Productivity Improving Your Reading Speed Improving Your Work/Life Balance Managing Your Career Mentor Relationships Navigating through Organizational Change Overcoming Procrastination Performing Under Pressure Perseverance at Work Polishing Your Professional Edge Public Speaking Strategies Time Management Unconscious Bias |
Business Analysis |
Key Business Analysis Competencies (BABOK® v3) Key Business Analysis Concepts (BABOK® v3) |
Project Management Curriculum |
PMBOK® Guide Sixth Edition PMI Agile Certified Practitioner (PMI-ACP)® PRINCE2® - Foundation (2017 Update) Project Management Ethics and Values Project Management for All |
Team Building Curriculum |
Making a Pitch Optimizing Performance on a Team Virtual Teams |
Customer Service Curriculum |
Essentials of Customer Service ITIL® 2011 Edition Intermediate Level: Operational Support and Analysis (OSA) ITIL® 2011 Foundation |
Industry Foundations |
Sales Curriculum |
Defensive Programming |
Defensive Programming in C# Defensive Programming in JavaScript and HTML5 Defensive Programming in iOS Defensive Programming in Android Secure Programming |
Generic Languages |
C++ Programming Getting Started with MATLAB Introduction to R Programming Introduction to Scala Introduction to Scalding Introduction to Swift Programming Perl Programming Essentials Programming with ANSI C Python for Data Science Python Fundamentals Ruby Full Stack Development Ruby on Rails 4.2 Working with Clojure |
Java 2 Programming |
Develop Microservices with Java and Spring Cloud Developing Applications Using Java Spring Introduction to Java EE 6 Java Hibernate Java Hibernate with Oracle 12c Java Multi-Tenant Cloud Programming Fundamentals Java Reactive Programming Java SE 8 Fundamentals Java SE 8 Programming Java SE7 Fundamentals Java SE7 Professional Java SE9 Development Using Akka Working with Java SE 7 |
Microsoft Web Applications |
Microsoft Azure Microsoft Azure and Web Services Programming in HTML5 with JavaScript and CSS3 WCF Essentials Web API Essentials |
Microsoft .NET Software Development Tools |
F# Fundamentals Introduction to ASP.NET Core 1.0 and MVC Microsoft .NET Framework: WPF with XAML and C# Secure Programming for .NET Software Development Fundamentals Visual Studio 2017 First Look Visual Studio Application Lifecycle Management Visual Studio Code Cross-platform Code Editor Visual Studio for New Users Visual Studio Mobile Center First Look |
Mobile Application Development |
Android For .NET Developers Apache Cordova Application Development with React and Flux Building Secure Mobile Apps Developing Android Applications Developing Apple Watch Applications Ionic Framework iOS 12 Application Development iOS 12 Application Development iOS Application Development Fundamentals Java and .NET Programming for IoT New Features in Android 5.x Lollipop For Developers PhoneGap Programming Cross-Platform Applications in Visual Studio with Xamarin Programming with Kotlin Reactive Programming with Redux Titanium |
Software Design |
JIRA Fundamentals Object-oriented Design Service Oriented Architecture SOLID Principles of Object-oriented Design TOGAF 9.1 Advanced |
Software Development Principles |
Agile Software Development Agile Software Testing AI Development with TensorFlow Building API Gateways Clean Coding Techniques Developing AI and Machine Learning Solutions with Python Developing AI and ML Solutions with Java EAI Patterns Essential Deployment Microservices Exploring Artificial Intelligence Exploring Machine Learning Exploring Microservices Exploring the Future of UI/UX Exploring Virtual Reality Kanban Fundamentals Microservices Architecture Microservices Design Patterns Pivotal Cloud Foundry Developer REST API and Microservices Software Practices (SCRUM) Software Practices: Waterfall The Full Stack Developer Mindset User Experience (UX) Design Foundations Using Docker for Java Microservices |
Software Testing |
Automation Using Appium Debugging Fundamentals Exploring Automation Microsoft Visual Studio Team Foundation Server 2013 Administration Software Testing Foundations Software Testing Fundamentals Software Testing with Cucumber Software Testing with TestNG Software Testing with Visual Studio Team Foundation Server 2017 Testing Android Apps with Genymotion Testing Social Media Applications Testing with JMeter Testing with JUnit Using Jasmine in Testing WebLOAD Performance Testing |
Web Development Technologies |
CQRS Theory Introduction to Ajax Development Web Development Using the Yeoman Stack |
Scripting and Web Languages |
Advanced jQuery Angular 4 Angular 5 Updates and Components Angular 6 Development Angular Reactive Programming AngularJS 2.0 AngularJS and ASP.NET 5 MVC 6 AngularJS Fundamentals Application Development with Node.js Application Development with Node.js and the .NET Framework Automating Tasks with Grunt Automating Web Development Tasks with Gulp.js Building Apps with jQuery Mobile Building Apps with MEAN Stack CSS3, Sass and Less Developing with Kendo UI Express 4.x Fundamentals JavaScript - Ember.js JavaScript - JsRender JavaScript - Knockout JavaScript Frameworks and Libraries JavaScript Front End Development JavaScript Sencha JavaScript Single Page Apps Javascript: Backbone.js jQuery jQuery Essentials Responsive Apps with Bootstrap TypeScript Essentials Underscore.js Using the LoopBack Node.js Framework |
Web Application Frameworks |
Building Dynamic Web Sites with LAMP Stack PHP Applications with the Zend Framework |
Web Design |
Using Balsamiq Using Justinmind Web Accessibility Fundamentals Web Design Essentials |
Web Services |
Apache Web Services with Tomcat REST API |