IBM DB2 UDB DBA Course Description


Module: 01

    Overview of DB2 9.5 on Windows
  • Contrast the DB2 Family of products
  • Identify the DB2 Tools
  • Functions of DB2 components
  • Explore installation and parameters Command Line Processor (CLP) & GUI Usage
  • Use the Command Line Processor
  • Explore the GUI environment
  • Describe the DAS role with GUI tools

Module: 02

    The DB2 Environment
  • Key features of an Instance
  • Create and drop an Instance
  • Use db2start and db2stop
  • Describe and modify theDBM cfg and DB cfg
  • Creating and altering DB2 objects.
  • Explore system Catalog tables, views
  • Compare DMS Vs SMS table Spaces.
  • Database with Automatic Storage.
  • Differentiate between table spaces, containers, extents, and pages

 

 Module: 03

    Creating Database Objects
  • List DB2 object hierarchy and physical directories & files
  • Explore the use of table partitioning
  • Review the use of Temporary Tables
  • Implementation of Check Constraints, Referential Integrity and Triggers

Module: 04

    Moving Data
  • Discuss the INSERT statement and Recognize its limitations
  • Explain the differences between IMPORT and LOAD
  • Explain the EXPORT, IMPORT, and LOAD syntax
  • Create and use Exception Tables and Dump-Files
  • Distinguish and Resolve Table States: Load Pending and Set Integrity Pending
  • Use the SET INTEGRITY command
  • Discuss the db2move and db2look commands

Module: 05

    Backup And Recovery
  • Describe the major principles and methods for backup and recovery
  • State the three types of recovery used by DB2
  • Explain the importance of logging for backup & recovery
  • Describe how data logging takes
  • Place –circular & archival logging
  • Use the BACKUP, RESTORE, and ROLLFORWARD commands
  • Perform a table space backup and recovery
  • Backup and recovery scenarios

Module: 06

    Locking And Concurrency
  • Explain why locking is needed
  • List objects that can be locked
  • Describe and discuss the various lock modes and their compatibility
  • Explain four different levels of data protection
  • Set isolation level and lock time out for current activity
  • Explain lock conversion & escalation
  • Describe causes of Deadlocks

Module: 07

    Problem Determination
  • Collect information for problem analysis and resolution
  • Use error logs for basic problem analysis
  • Describe four types of monitors:         
  1. Snapshot Monitor, 
  2. Event Monitor,
  3. Activity Monitor and 
  4. Health Monitor
 

Module: 08

    Application Issues and Performance
  • Prepare applications that access DB2 data for execution
  • Define the concept of clustering, and determine the proper cluster sequence
  • Use RUNSTATS, REORGCHK, and REORG to enhance application performance
  • Work with the EXPLAIN facility

Module: 09

    Security
  • Use Access Control Mechanisms to implement database security
  • Use group IDs to create a control hierarchy
  • Describe Label Based Access Control
  • Describe privileges within a database
  • Describe privileges required for binding and executing a package
  • Describe the difference between explicit privileges & implicit privileges
  • Describe the different level of authorization

No comments:

Post a Comment