IT Brain Training

8-2-619/2/1/1 Suite 304-A
Banjara Hills, Road No 11
Hyderabad, 500034


DB2 Database 
DB2 database offers industry leading performance, scale, and reliability on your choice of platform from Linux, UNIX and Windows to z/OS. Learn how customers are transforming their data center with DB2.

Overview of DB2 9

  • Contrast the DB2 Family of products
  • Identify the DB2 Products
  • Describe the functions of DB2 components

Command Line Processor (CLP) and Graphical User Interface (GUI) usage

  • Use the Command Line Processor
  • Explore the GUI environment
  • Describe the DB2 Administration Server (DAS) role with GUI tools

Creating databases

  • Review specifics of creating a database
  • Explore the System Catalog tables and views
  • Compare Database Managed Storage (DMS) versus System Managed Storage (SMS) table spaces
  • Describe how to setup and manage a DB2 database with Automatic Storage enabled
  • Differentiate between table spaces, containers, extents, and pages
  • Define table spaces
  • Use the get snapshot for tablespaces command to display table space statistics
  • Explore Database configuration parameters

Creating database objects

  • List DB2 object hierarchy and physical directories and files
  • Create the following objects: Schema, Table, View, Alias, Index
  • Explore the use of table partitioning
  • Review the use of Temporary Tables
  • Explore the use and implementation of Check Constraints, Referential Integrity and Triggers
  • Exploring the need for and the use of Large Objects
  • Recognize XML and its native store as critical infrastructure for emerging technologies

Working with DB2 Data

  • Structured Query Language (SQL)
  • Data Control Language (DCL)
  • Data Definition Language (DDL)
  • Data Manipulation Language (DML)
  • Functions and Stored Procedures
  • Transaction Management

Locking and concurrency

  • Explain why locking is needed
  • List objects that can be locked
  • Describe and discuss the various lock modes and their compatibility
  • Explain four different levels of data protection
  • Set isolation level and lock time out for current activity
  • Explain lock conversion and escalation
  • Describe the situation that causes deadlocks


  • Use DB2 access control mechanisms to implement security within the database
  • Use group IDs to create a control hierarchy
  • Describe privileges within a database
  • Describe privileges required for binding and executing a package
  • Describe the difference between explicit privileges and implicit privileges
  • Describe the different DB2 authorization levels