IBM DB2 Agenda

Programming

Duration:                         40 HRS / 5 DAYS)

Delivery Method:         Classroom-based, Virtual Instructor Led Training

black laptop computer turned on on table

Description

Agenda


Day 1:

·      Describe the system platforms supported by the DB2 Family of products

·      Compare the features available with different DB2 LUW product editions 

·      Select the appropriate DB2 client software to support application client or server systems

·      Choose a method to install your DB2 LUW product edition and plan migrations of existing DB2 LUW servers to the latest release

·      Compare cloud-based DB2 options to a locally installed DB2 server

·      Utilize the DB2 Command Line Processor to run DB2 commands, SQL statements and command scripts

·      Invoke the CLPPlus command line processor to connect databases and to define, edit, and run statements, scripts, and commands

·      List some of the ways IBM Data Server Manager can be used to support DB2 database administration and SQL execution with DB2 LUW servers 

·      Specify the key features of an instance

·      Create and drop a DB2 instance

·      Use db2start and db2stop commands to manage a DB2 instance

·      Display and set DB2 registry variables

·      Describe and modify the database manager configuration

·      Plan the initial storage allocations for a database including catalog tables and log files

·      Create a new database using DB2 native encryption

·      Explore the System Catalog tables and views

·      Check and update Database configuration parameter settings

·      Compare DMS and Automatic Storage management for table spaces

·      Describe how to setup and manage a DB2 database with Automatic Storage enabled

·      Define Storage Groups to manage databases with different classes of storage available

·      Differentiate between table spaces, containers, extents, and pages

·      Create and alter table spaces

·      Use DB2 commands and SQL statements to display current table space statistics and status information

·      Describe the DB2 object hierarchy

·      Create the following objects:

·      Schema, Table, View, Alias, Index

·      Review the use of temporary tables

·      Explore the use and implementation of check constraints, referential integrity and triggers

·      Utilize BLU Acceleration, column-organized tables to improve analytics query performance

·      Explain the difference between system-period temporal tables and Application-period temporal tables

·      List the types of compression available for tables and indexes

 

Day 2

·      Use the db2look utility to export database structures for future use

·      Discuss using the INSERT SQL statement to populate tables 

·      Explain the differences between IMPORT and LOAD processing

·      Explain the EXPORT, IMPORT, and LOAD command options

·      Create and use Exception Tables and Dump-Files

·      Check table status using LOAD QUERY

·      Describe the ANALYZE phase of LOAD command processing used for loading BLU Acceleration, column-organized tables. 

·      Check the Load Pending and Set Integrity Pending status for a table

·      Use the SET INTEGRITY command

·      Discuss the db2move and db2look commands

·      Use the ADMIN_MOVE_TABLE procedure to move a table to different table spaces

·      List some of the features of the Ingest utility for continuous data ingest

·      Describe the major principles and methods for backup and recovery

·      State the three types of recovery used by DB2

·      Explain the importance of logging for backup and recovery

·      Describe how data logging takes place, including circular logging and archival logging

·      Use the BACKUP, RESTORE, ROLLFORWARD and RECOVER commands

·      Perform a table space backup and recovery

·      Restore a database to the end of logs or to a point-in-time

·      Discuss the configuration parameters and the recovery history file and use these to handle various backup and recovery scenarios

·      Create an encrypted backup image to improve data security

·      Explain the facility of the DB2 RESTORE command to recover table spaces to different containers

·      Use the SET TABLESPACE CONTAINERS command to define new containers during a redirected restore

·      Utilize the SET STOGROUP PATHS command to change the storage paths for automatic storage tablespaces in storage groups

·      Plan the use of redirected restore as part of a disaster recovery

 

Day 3

·      Plan the use of RUNSTATS, REORGCHK and REORG utilities for maintaining database efficiency

·      Configure the DB2 instance to set the location for diagnostic data and message severity levels for basic problem analysis

·      Describe the methods that can be used for monitoring database and application activity including db2pd commands, Event Monitors and using SQL statements to access statistics

·      Describe the function of EXPLAIN and use this facility to assist basic analysis

·      Use the db2advis command to analyze a workload for potential performance improvements

·      Use the db2fodc command to collect diagnostic data for a system hang

·      Explain why locking is needed

·      List objects that can be locked

·      Describe and discuss the various lock modes and their compatibility

·      Explain four different levels of data protection

·      Set isolation level and lock time out for current activity

·      Explain lock conversion and escalation

·      Describe the situation that causes deadlocks

·      Create a LOCKING EVENT monitor to collect lock related diagnostics

·      Set database configuration options to control locking event capture

·      Describe the infrastructure used to support monitoring

·      Configure a database to collect the activity, request and object metrics returned by the Monitoring Table functions

·      Investigate current application activity that might indicate performance problems using SQL statements

·      Use the DB2-provided views and functions in SQL to evaluate efficient use of database memory for locks, sorting and database buffer pools

·      Check database health indicators, like log space available and table space utilization using CLP queries using Monitor functions and views


Day 4

·      Use DB2 access control mechanisms to implement security within the database

·      Explain the tasks performed by the SYSADM user, the SECADM user and a DBADM user

·      Compare the use of database roles to user groups for security

·      Describe privileges required for binding and executing an application package

·      Describe the difference between explicit privileges and implicit privileges

·      List the methods for implementing encryption for database connections

·      List the advantages of creating a Trusted Context for a three-tier application system

·      Review the considerations of using standard DB2 database recovery options

·      Explain the capabilities of the REBUILD option for the RESTORE command

·      List the types of information included in each DB2 backup image and describe how it is used to support rebuilding a database

·      Plan for supporting database and disaster recovery scenarios using DB2 database and table space backups using the RESTORE command with a REBUILD option

·      Utilize LIST UTILITIES SHOW DETAIL to monitor progress of a RESTORE utility during database rebuilding

 

Day 5

·      Db2 HADR Concepts and implementation

·      Db2 HADR Standby database management

·      Db2 Cluster Management Concepts