IBM DB2 UDB DBA Course Description
Module: 01
Overview of DB2 9.5 on Windows
- Contrast the DB2 Family of products
- Identify the DB2 Tools
- Functions of DB2 components
- Explore installation and parameters Command Line Processor (CLP) & GUI Usage
- Use the Command Line Processor
- Explore the GUI environment
- Describe the DAS role with GUI tools
Module: 02
The DB2 Environment
- Key features of an Instance
- Create and drop an Instance
- Use db2start and db2stop
- Describe and modify theDBM cfg and DB cfg
- Creating and altering DB2 objects.
- Explore system Catalog tables, views
- Compare DMS Vs SMS table Spaces.
- Database with Automatic Storage.
- Differentiate between table spaces, containers, extents, and pages
Module: 03
Creating Database Objects
- List DB2 object hierarchy and physical directories & files
- Explore the use of table partitioning
- Review the use of Temporary Tables
- Implementation of Check Constraints, Referential Integrity and Triggers
Module: 04
Moving Data
- Discuss the INSERT statement and Recognize its limitations
- Explain the differences between IMPORT and LOAD
- Explain the EXPORT, IMPORT, and LOAD syntax
- Create and use Exception Tables and Dump-Files
- Distinguish and Resolve Table States: Load Pending and Set Integrity Pending
- Use the SET INTEGRITY command
- Discuss the db2move and db2look commands
Module: 05
Backup And Recovery
- Describe the major principles and methods for backup and recovery
- State the three types of recovery used by DB2
- Explain the importance of logging for backup & recovery
- Describe how data logging takes
- Place –circular & archival logging
- Use the BACKUP, RESTORE, and ROLLFORWARD commands
- Perform a table space backup and recovery
- Backup and recovery scenarios
Module: 06
Locking And Concurrency
- Explain why locking is needed
- List objects that can be locked
- Describe and discuss the various lock modes and their compatibility
- Explain four different levels of data protection
- Set isolation level and lock time out for current activity
- Explain lock conversion & escalation
- Describe causes of Deadlocks
Module: 07
Problem Determination
- Collect information for problem analysis and resolution
- Use error logs for basic problem analysis
- Describe four types of monitors:
- Snapshot Monitor,
- Event Monitor,
- Activity Monitor and
- Health Monitor
Module: 08
Application Issues and Performance
- Prepare applications that access DB2 data for execution
- Define the concept of clustering, and determine the proper cluster sequence
- Use RUNSTATS, REORGCHK, and REORG to enhance application performance
- Work with the EXPLAIN facility
Module: 09
Security
- Use Access Control Mechanisms to implement database security
- Use group IDs to create a control hierarchy
- Describe Label Based Access Control
- Describe privileges within a database
- Describe privileges required for binding and executing a package
- Describe the difference between explicit privileges & implicit privileges
- Describe the different level of authorization
No comments:
Post a Comment