Register today through Broadcom’s Learning Management System (LMS) - Learning@Broadcom for Broadcom Mainframe Product Instructor-Led virtual training.
Sessions are led by our Subject Matter Experts and are provided at no cost to customers on active maintenance.
Region: EMEA
Length: 32 Hours
Dates: January 13 - 16, 2025
Time: 9:00 - 5:00 PM UTC - Coordinated Universal Time (Europe)
Instructor: Jose Arias
CA ACF2 for z/OS provides innovative and comprehensive security for various business transaction environments that enable you to fully realize the reliability, scalability, and cost effectiveness of the mainframe. This course will show you how CA ACF2 provides protection by default. You will also learn about the control databases and how they can be used to write, compile, decompile, and test CA ACF2 Access Rules for data sets.
Region: EMEA
Length: 24 Hours
Dates: January 20 - 23, 2025
Time: 12:00 - 6:00 PM UTC - Coordinated Universal Time (Europe)
Instructor: Chad Rikansrud
Learn how the various layers of the stack work (Operating System, VTAM, RACF, Network, etc.) so you can develop your own techniques and skillets to perform the appropriate mainframe pentesting. This course provides training on the latest and up-to-date attack vectors, techniques for gaining system access, and how to perform an end-to-end penetration test. Attendees will be introduced to the platform by being allowed to explore the operating system and understand the weaknesses within the protocol that allow us to automate much of our testing. Attendees will also be introduced to several open-source tools and libraries available for all the steps of a penetration test including Nmap, Python, Kali, and Metasploit as well as being able to write their own tools on the mainframe using REXX, JCL, C, and CLISTs.
This course consists of lectures, instructor-led demonstrations, and hands-on lab activities.
Region: EMEA
Length: 32 Hours
Dates: February 17 - 20, 2025
Time: 9:00 - 5:00 PM UTC - Coordinated Universal Time (Europe)
Instructor: Roman Gazar
A quick introduction to Python for programmers in other languages, especially REXX.
Python's data types, operators and conditions, loops, and functions are covered during the workshop. Attendees will get a necessary introduction to objects, classes, and Object Oriented programming methodology [OOP]. Advanced language statements like generators, decorators, and lambdas are explained on the basic level of understanding. Mentioned are essential built-in functions to create Python scripts accepting command line arguments and working with files. The workshop briefly introduces Python Standard Library [PSL] and working with additional modules and packages. The workshop suits REXX programmers who want to start writing Python scripts.
Region: EMEA
Length: 24 Hours
Dates: March 31 - April 2, 2025
Time: 9:00 - 4:00 PM UTC - Coordinated Universal Time (Europe)
Instructor: Chad Rikansrud
Learn how the various layers of the stack work (Operating System, VTAM, RACF, Network, etc.) so you can develop your own techniques and skillets to perform the appropriate mainframe pentesting.
This course provides training on the latest and up-to-date attack vectors, techniques for gaining system access, and how to perform an end-to-end penetration test. Attendees will be introduced to the platform by being allowed to explore the operating system and understand the weaknesses within the protocol that allow us to automate much of our testing. Attendees will also be introduced to several open-source tools and libraries available for all the steps of a penetration test including Nmap, Python, Kali, and Metasploit as well as being able to write their own tools on the mainframe using REXX, JCL, C, and CLISTs.
This course consists of lectures, instructor-led demonstrations, and hands-on lab activities.
Region: North America
Length: 2.5 Hours
Dates: See below for the FY25 dates
Time: 9:00 - 11:30 AM EST - Eastern Standard Time (North America)
Instructor: Elayne Hobbs
TPX® Session Management (TPX) is a menu-driven system that provides secure, authenticated access to multiple applications on the mainframe simultaneously, with the ability to swap between them without degrading productivity.
TPX has the tools essential for flexible and scalable administration, authentication, multitasking, session switching, connectivity, system management, and communication.
In this course, you’ll learn the basics of what TPX is and how it is used. Through a combination of lectures, demonstrations, hands-on, and knowledge checkpoint activities, you’ll learn to get started using TPX in your environment.
Training Dates:
Region: North America
Length: 90 Minutes
Dates: See below
Time: 9:00 - 10:30 AM EST - Eastern Standard Time (North America)
Instructor: Aaron Young
From business applications to subsystems to vendor-provided software, the need to understand and support Kubernetes (K8s) and container-based applications has arrived.
During this introductory session, we will provide a brief overview of Kubernetes, compare Kubernetes concepts to z/OS concepts, and then guide you through a hands-on experience on deploying Kubernetes, installing and running a sample container-based application on Kubernetes, and monitoring the application’s health afterward.
Training Dates:
Region: North America
Length: 4 Hours
Dates: February 12, 2025
Time: 10:00 - 2:00 PM EST - Eastern Standard Time (North America)
Instructor: Carla Flores
Cleanup for z/OS (Cleanup) reduces the effort and pressure associated with maintaining current regulatory, statutory, and audit requirements. It does this by removing obsolete, unused, redundant, and excessive access rights through easily automated, virtually unattended, and continuous cleanup of mainframe security databases ACF2™, Top Secret®, and IBM RACF®.
Region: North America
Length: 24 Hours
Dates: March 4 - 6, 2025
Time: 9:00 - 5:00 PM EST - Eastern Standard Time (North America)
Instructor: Chad Rikansrud
Learn how the various layers of the stack work (Operating System, VTAM, RACF, Network, etc.) so you can develop your own techniques and skillets to perform the appropriate mainframe pentesting.
This course provides training on the latest and up-to-date attack vectors, techniques for gaining system access, and how to perform an end-to-end penetration test. Attendees will be introduced to the platform by being allowed to explore the operating system and understand the weaknesses within the protocol that allow us to automate much of our testing. Attendees will also be introduced to several open-source tools and libraries available for all the steps of a penetration test including Nmap, Python, Kali, and Metasploit as well as being able to write their own tools on the mainframe using REXX, JCL, C, and CLISTs.
This course consists of lectures, instructor-led demonstrations, and hands-on lab activities.
Registration is through Broadcom’s Learning Management System (LMS) - Learning@Broadcom.
A final email with all of the logistical details for the training will be sent a week before the class start date.
Course capacity is limited to help ensure efficient knowledge transfer and access to course labs.