Contenido
KEY TOPICS
Introduction
- Understand the fundamental difference between static and dynamic SQL programs
- Define the major responsibility of any application program
- Define the major responsibilities of the DB2 system
- Understand the basic principles of DB2 recovery
- Discuss the basic roles people play in a DB2 shop
Setting up a DB2 database
- Describe the DB2 objects that make up a DB2 database
- Select the most appropriate parameters for these DB2 database objects so that they are implemented with the most appropriate attributes
- Create storage groups, databases, table spaces, tables, views, synonyms, aliases, materialized query tables and indexes
- Alter the attributes of DB2 database objects as requirements change over time
- Describe how data is stored in a DB2 database
Referential Integrity (RI)
- Describe the concepts of PRIMARY KEY, UNIQUE KEY and FOREIGN KEY
- Implement these keys in DB2
- Describe the concepts of REFERENTIAL CONSTRAINT and RI
- Implement REFERENTIAL CONSTRAINTS on new or existing tables with the appropriate DELETE rules
- Drop REFERENTIAL CONSTRAINTS and their enforcing indexes
- Query the appropriate catalog tables for RI details
- Discuss identity columns and sequence objects
Getting data into and out of DB2
- Describe the importance of free space and implement an appropriate quantity in DB2 table spaces and index spaces
- Describe how free space is used by DB2 during SQL INSERT, DELETE, and UPDATE processing and how free space is managed by DB2 during LOAD, REORG, RECOVER INDEX and REBUILD INDEX
- Describe how DB2 utilities may be executed, monitored, terminated and restarted.
- Run the DB2 LOAD utility and make full use of its many features
- Run the CHECK DATA utility to check DB2 table space data for any violations of referential integrity constraints or table check constraints
- Run the DB2 UNLOAD utility and make full use of its many features in a DB2 UDB for z/OS and OS/390 Version 7 system or later
Keeping your DB2 data in good shape
- Describe and interpret the statistics collected by RUNSTATS
- Run RUNSTATS with an appropriately chosen set of options
- Describe why it is necessary to periodically REORG your table spaces and indexes
- Run REORG with an appropriately chosen set of options
Application Data Recovery Basics
- Make DB2 user data available again following media failures
ESA data compression
- Describe the data compression feature
- Specify it for a table space
- Use the DSN1COMP utility to determine if its specification will help conserve Direct Access Storage Device (DASD) space
Program Preparation / Bind
- Describe the main steps needed to prepare a program that accesses DB2 with embedded static SQL
Security
- Describe DB2 global security
- Describe the various DB2 authids and how they are established
- Understand how DB2 security controls access to data
- Describe and implement DB2 privileges and authorities appropriately
- Describe how ownership is established in DB2
- Describe DB2 authorization checking
- Describe and implement security for plans and packages
- Describe multilevel security
- Describe the advantages and considerations for using the Resource Access Control Facility (RACF) / DB2 external security module
Serialization
- Describe concurrency
- Explain the aspects of transaction locks
- Tell when locks are acquired and released
- Describe S-Locks and X-Locks
- Explain isolation levels
- Explain LOCKSIZE
The course also includes extensive machine lab exercises which give you the opportunity to gain hands-on experience of:
- Creating and using databases, table spaces, tables, views and indexes
- Defining check and referential constraints
- Creating and running the following utility jobs: LOAD, CHECK DATA, and UNLOAD; RUNSTATS and REORG; COPY and RECOVER
- DB2 security
- DB2 locking
*Precio no incluye IVA