Db2 12 for z/OS Introduction to System Administration Training




Per Participant

Course Description

Db2 12 for z/OS Introduction to System Administration Training is designed to introduce professionals to the knowledge and skills required to administer a Db2 12 for z/OS system. This technical course teaches individuals techniques to start and stop a Db2 system and utilize the SET SYSPARM command. You will learn to enter the system log to collect information regarding subsystem operation, initialization, or shutdown and demonstrate the address space structure and components of a Db2 subsystem.

This program is suitable for system administrators and database administrators who want to boost their credibility. By the end of the course, you will learn to elaborate the use of RACF and the function of roles and trusted contexts, operate with the active log data sets, and apply security methods for a Db2 subsystem.

Prerequisites for this training

Participants should have the following knowledge and skills.

  • Understanding of the objects (such as databases, table spaces, tables, indexes, and so forth) used in a Db2 subsystem
  • Basic knowledge of SQL
  • At least one year as a z/OS systems programmer or equivalent knowledge
  • OR

  • At least one year as a Db2 for z/OS Database Administrator

Who should attend this course?

This course is intended for System administrators on the other hand Database Administrators and professionals working in #GOATs can sign up for this training.


  • Virtual Live Training

Jun 14, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Jul 12, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training
  • Guaranteed to Run

Aug 21, 2023

9:30 am - 5:30 pm EST
  • Virtual Live Training

Sep 20, 2023

9:00 am - 5:00 pm EST
Request Batch

What you will learn

  • Stopping and starting the Db2 subsystem.
  • Utilizing the SET SYSPARM commands.
  • Accessing the system logs into another gathered information relevant to operations, shutting down and subsystem initializations.
  • Elaborating about the components along with address space structure of the Db2 administration.
  • Explaining the utilization of RACF or other external security programs for the Db2 connectivity security.
  • Explaining the utilization of trusted and role contexts.
  • Implementing the security methods for the Db2 subsystem.
  • Explaining about Db2 program flowed in entire environment.
  • Explaining the parameter settled for the IRLM.
  • Utilizing and invoking Db2 TSO facilities.
  • Utilizing the Db2 catalogs for monitoring the subsystem authorities.
  • Functioning with Active Log Data Sets.
  • Explaining about Db2 logs.
  • Utilizing the SET LOG RESUME and SET LOG SUSPEND.
  • Utilizing DSNJU004 for printing log maps and interpreting the results.
  • Utilizing DSNJ003 for renaming Db2 data sets.
  • Planning to recover from BSDS failure or error.
  • Controlling and monitoring Db2 subsystem.
  • Explaining the transaction flows in CICS and IMS environments.
  • Elaborating about DB2 and CICS environment.
  • Explaining the vast differentiations between SQLJ and JDBC.


  • Starting Db2 as part of the z/OS IPL process
  • Data set allocation and APF authorization
  • The START DB2 and STOP DB2 commands
  • zParms, DSNTIJUZ, and DSNZPARM
  • Address spaces
  • IRLM and lock storage
  • BSDS and logging
  • Catalog and directory
  • Program preparation and execution
  • Transaction execution
  • Data sharing in the sysplex
  • Protecting Db2 data sets
  • Controlling connections to Db2
  • Db2 authorization exits
  • Trusted context and roles
  • Securing an application server
  • Authorizations
  • Controlling access for dynamic and static SQL
  • Access control authorization exits
  • Distributed security
  • Connection types and language interfaces
  • Program flow
  • Transaction processing
  • Thread reuse
  • SIGNON exit
  • CICS connections to Db2
  • DSNC transaction
  • IMS-Db2 introduction
  • IMS TM
  • IMS/DLI batch environment
  • Distributed attachment
  • Location aliases
  • DDF profiling
  • Block fetch
  • Db2 REST services
  • The Db2 log
  • Log commands
  • Archiving considerations
  • BSDS
  • Categorization
  • DSNJU003 and DSNJU004
  • Issuing Db2 commands
  • Basic workload controls
  • Monitoring and controlling utilities
  • DISPLAY commands
  • Starting / stopping databases
  • Planning for recovery
  • Table space recovery
  • Log considerations
  • DISPLAY and SET LOG commands
  • Recovery considerations
  • System checkpoints
  • System restart after normal shutdown
  • Page externalization
  • Two-phase commit processing
  • System restart after system failure
  • Recovery considerations
  • Overview
  • Routines
  • Scheduling features
  • Life cycle
  • Synchronization
  • Commands
  • With Microtek Learning, you’ll receive:

    • Certified Instructor-led training
    • Industry Best Trainers
    • Official Training Course Student Handbook
    • Pre and Post assessments/evaluations
    • Collaboration with classmates (not available for a self-paced course)
    • Real-world knowledge activities and scenarios
    • Exam scheduling support*
    • Learn and earn program*
    • Practice Tests
    • Knowledge acquisition and exam-oriented
    • Interactive online course.
    • Support from an approved expert
    • For Government and Private pricing*

    * For more details call: +1-800-961-0337 or Email: info@microteklearning.com

    Request Call

    Our Clients

    For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

    • 300+ enterprise clients
    • 100,000+ professionals trained
    • Service 70 of the Fortune 100
    • 96% of our clients would recommend us
    our clients

    Our Awards

    our awards
    why choose us
    Accredited By

    Course Details

    • Start Date: Jun 14, 2023
    • Duration: 3 Days
    • Enrolled: 1431
    • Price: $2295
    side post side mode

    Talk to Learning Advisor