db2,db2 udb dba,db2 luw,install,migration,update,objects,utilities,tools,control center,hadr,high data availability,performance tuning,insatnce,database,backup and recovery,explain
Pages
▼
IBM DB2 UDB DBA Course Description
Module: 01
Overview of DB2 9.5 on Windows
Contrast the DB2 Family of products
Identify the DB2 Tools
Functions of DB2 components
Explore installation and parameters Command Line Processor (CLP) & GUI Usage
Use the Command Line Processor
Explore the GUI environment
Describe the DAS role with GUI tools
Module: 02
The DB2 Environment
Key features of an Instance
Create and drop an Instance
Use db2start and db2stop
Describe and modify theDBM cfg and DB cfg
Creating and altering DB2 objects.
Explore system Catalog tables, views
Compare DMS Vs SMS table Spaces.
Database with Automatic Storage.
Differentiate between table spaces, containers, extents, and pages
Module: 03
Creating Database Objects
List DB2 object hierarchy and physical directories & files
Explore the use of table partitioning
Review the use of Temporary Tables
Implementation of Check Constraints, Referential Integrity and Triggers
Module: 04
Moving Data
Discuss the INSERT statement and Recognize its limitations
Explain the differences between IMPORT and LOAD
Explain the EXPORT, IMPORT, and LOAD syntax
Create and use Exception Tables and Dump-Files
Distinguish and Resolve Table States: Load Pending and Set Integrity Pending
Use the SET INTEGRITY command
Discuss the db2move and db2look commands
Module: 05
Backup And Recovery
Describe the major principles and methods for backup and recovery
State the three types of recovery used by DB2
Explain the importance of logging for backup & recovery
Describe how data logging takes
Place –circular & archival logging
Use the BACKUP, RESTORE, and ROLLFORWARD commands
Perform a table space backup and recovery
Backup and recovery scenarios
Module: 06
Locking And Concurrency
Explain why locking is needed
List objects that can be locked
Describe and discuss the various lock modes and their compatibility
Explain four different levels of data protection
Set isolation level and lock time out for current activity
Explain lock conversion & escalation
Describe causes of Deadlocks
Module: 07
Problem Determination
Collect information for problem analysis and resolution
Use error logs for basic problem analysis
Describe four types of monitors:
Snapshot Monitor,
Event Monitor,
Activity Monitor and
Health Monitor
Module: 08
Application Issues and Performance
Prepare applications that access DB2 data for execution
Define the concept of clustering, and determine the proper cluster sequence
Use RUNSTATS, REORGCHK, and REORG to enhance application performance
Work with the EXPLAIN facility
Module: 09
Security
Use Access Control Mechanisms to implement database security
Use group IDs to create a control hierarchy
Describe Label Based Access Control
Describe privileges within a database
Describe privileges required for binding and executing a package
Describe the difference between explicit privileges & implicit privileges
No comments:
Post a Comment