10 training courses found
Audience Nowadays it's hard to find an organisation that hasn't used virtualisation techniques somewhere in its IT infrastructure, and all IT auditors need to be able to identify and evaluate the additional security and management tissues that come with virtualisation. Course Objectives In this intensive 2-day course, you will learn about the various types of virtualisation, how they work and what benefits and risks they can bring to a business.
Audience: This is an intermediate course for z/OS system programmers, z/OS performance analysts, and z/OS performance administrators new to performance management for their z/OS system.
Audience This course will be of interest to anyone involved with analysing and resolving problems with IBM (or third party) products in the z/OS, CICS, IMS, Network or related areas. Course Objectives This class provides students with comprehensive practical knowledge in using the Interactive Problem Control System to gather rapidly pertinent problem analysis data.
Audience This course is intended for all those who may be concerned with planning for, implementing, or managing tape data using DFSMSrmm (a component of z/OS DFSMS). As such it is suitable for System Programmers, Storage Administrators and all those who share with them the management of the installation's data.
Audience This course is designed for those z/OS technicians who require a greater understanding of VSAM within their z/OS installation. This will allow them to analyse their use of VSAM with the aim of improving performance and reliability and reducing errors.
Audience Delegates who needs to access and work with a MySQL Database. Course Objectives This course covers the basics of SQL as used in MySQL.
This course is intended for developers and others who need to use ADO.NET 4.
Audience This training course is aimed at developers who need to create distributed applications for the Java EE 6 platform. Course Objectives Java Enterprise Edition defines a platform for multi-tier enterprise development.
Audience Anyone who needs to know and understand the workings of firewall technology, from a security or audit standpoint, should attend this course. If you come from one of these business areas, you would find the course very useful: IT systems implementer wishing to protect vulnerable systems.
Audience This course is for IT professionals requiring an understanding of basic VSAM structures and the capabilities of the Access Method Services utility, IDCAMS. Course Objectives This is a workshop with a mix of theory and practical session.