This course, suitable for all DBAs working in Db2 for z/OS environments, builds upon the skills taught in the course 'Db2 for z/OS: Database Design, Implementation and Administration'. It provides attendees with an understanding of additional and advanced administration tasks. It also examines in-depth a number of the subjects covered by the earlier course.<br><br>This course is also available for one-company, on-site presentations and for live presentation over the Internet, via the Virtual Classroom Environment service.
Enhanced ALTER statement; altering data types; altering index keys; altering tablespace types and attributes; restrictions on altering objects; impact of altering objects; pending definition changes; versioning; reclaiming versions.
Partition ManagementIndex defined vs table defined partitioning; adding new partitions; rotating partitions; changing partition boundaries; rebalancing partitions; impact on user tasks.
Distinct Data TypesNeed for distinct types; defining and using distinct types; distinct type security.
User-defined FunctionsNeed for user defined functions (UDFs); sourced, external and SQL functions; defining UDFs; using UDFs in SQL; UDF security.
TriggersUse of triggers; before, after and 'instead of' triggers; defining triggers; trigger cascading.
Stored ProceduresNeed for stored procedures; stored procedure environment; external procedures; native SQL procedures; coding and defining stored procedures; stored procedure security.
Large Object & XML Data TypesLarge object data; relationship between base and auxiliary tables; defining large objects; large object locking considerations; large object logging and recovery considerations; in-line LOB data; XML data support; XML data model; XML data storage; Indexing XML data; XML data backup & recovery considerations.
Specialised Table TypesMaterialized Query Tables (MQTs); defining MQTs; converting existing tables; populating MQTs; Automatic Query Rewrite (AQR); defining and using clone tables; clone table limitations; exchanging data with clone table; defining and using temporal tables; defining and using archive tables.
Row & Column Level Access ControlMulti-level security concepts; security labels; row-level security granularity; effect of multi-level security on data manipulation language statements; row and column access control; row permissions; column masks.
Hands-on ExercisesHands-on exercises complement the course material to assist in full understanding of the subject matter.
Join our public courses in our Russia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.