Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - CICS Transaction Server: Command Level Programming - Advanced


distance-learning center

Computer-Device_Tethered-Distance-learning Distance-learning-Building

Professional Distance-learning

IT Training Services


CICS Transaction Server: Command Level Programming - Advanced
DURATION: 5 days

FEE: $2,975

Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

There is a surcharge associated with training two or fewer students.


  • Programmer
  • System Analyst
  • System Designer
  • IT Professional


    1. Handling Exception Conditions
      • Code a program to handle file I/O errors.
      • Recognize the advantages and disadvantages of using the HANDLE commands.
      • Code a program using the HANDLE CONDITION.
      • Code the same program without the HANDLE CONDITION.
    2. File Control
      • Use generic keys in a VSAM KSDS.
      • Code an application that access records using a partial key in the primary key.
      • Code a pseudo conversational program which performs a query on a VSAM KSDS and displays the results.
    3. VSAM Performance and Design
      • Understand how to design, code, and test a modular CICS program.
      • Given a case study, design the modules for a CICS application.
      • The case study will be analyzed in terms of its design techniques, response time issues, and completeness.
    4. Temporary Storage
      • Handle the processing of running out of temporary storage memory.
    5. Debugging
      • Execute programs and debug common errors with Abend-AID and CEDF.
      • Additional tools can also be used.
    6. VSAM Record Level Sharing
      • Access a VSAM dataset using the enhanced API for VSAM RLS.
      • Monitor the locks on the dataset.
    7. Performance Topics
      • Given a poorly written program, determine the best methods for performing a recode into a well written and efficient program.
      • Determine the strings and buffers that should be defined for a heavily access dataset.
    8. CICS Design Considerations
      • Given a case study, determine the CICS techniques and resources used in the design of the program.
      • The following issues will be analyzed: 1- Data passing techniques. 2- Performance. 3- Sharing data between partitions. 4- locking and long running programs.
    9. Dynamic Storage
      • Create a stack with routines to pop and push the stack.

    Web-based Training   Blended Learning    


Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.

SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.