CICS for Systems Programmers

CICS for Systems Programmers


This course is aimed at CICS systems programmers and technical CICS programmers who are new to the installation and tailoring of CICS Transaction Server.


Delegates must be familiar with CICS architecture and CICS facilities and have a working knowledge of z/OS, JCL, TSO/ISPF, SNA concepts, VSAM concepts and Access Method services.


4 days. Hands on.

Course Objectives

Upon completion of this course, attendees will be able to:

  • Confidently install and customize a CICS Transaction Server system
  • Describe how CICS resources are defined and how CICS communicates with VTAM and TCPIP
  • Make use of the VSAM and DB2 interfaces as well as the Operational and Intersystem Communication Interfaces
  • Use the major CICS utilities
  • Describe the recovery methods available for CICS

A CICS/TS system will be available for online access during practical exercises, to support the material covered in lecture presentations.

Course Content

CICS Installation and Generation
The CICS Datasets.
How to define CICS to z/OS.
How to define CICS to VTAM and TCPIP.
The CICS Startup JCL.

CICS/TS Internal Structure
The Role of the Domains.
The Role of the Kernel Domain.
The Role of the Dispatcher Domain.
The Major Control Blocks.

CICS/TS Storage Manager
The Storage Manager Facilities.
Storage Protection.
The eight Dynamic Storage Areas.
The Transaction Isolation facility.

The CICS Tables
The Program List table Post Initialisation.
The program List Table Shutdown.
The System Initialisation Table.
The System Recovery Table.

Resource Definition Online
The DFHCSD dataset.
The CEDA transaction.
The Components of RDO.
Building the Definitions for CICS.
The Batch Facility.
The CICSlog destinations.
Audit trailing.

The major VTAM control blocks.
The Terminal Control Table.
Sequential Terminals.
Controlling the VTAM Interface.
Defining the TCPIP interface.
The TCPIPSERVICE definition.
The Listener Transaction.
Defining Sockets and Ports.
Incoming Transactions.

The Autoinstall Facility
The Components of Autoinstall.
What is passed to the exit.
The Logon process.
The Logoff process.

CICS Security Requirements
Sources of threat.
What can be secured.
Identifying CICS datasets.
The RACF Class Descriptors.
How to define the CICS Resources to RACF.

File Control and DB2
Defining the FCT.
The VSAM environment.
Displaying the FCT online.
DB2 components.
The Attachment facility.
The DSNC transaction.
Defining the DB2 resources.

CICS Operations
The Master Terminal Operation.
Shutting Down the CICS system.

Defining MRO and LUTYPE6.2
The MRO environment.
The Online options needed to define MRO.
The LUTYPE6.2 environment.
The Online options needed to define LUTYPE6.2.
How to Define the TOR, AOR, FOR.
What is the CICS Relay.
What is the Mirror.
Defining TCPIP Links.

Controlling the MRO and LUTYPE6.2 Environment
Establishing the Intersystem environment.
Controlling the Interface.
Resolving Intersystem Problems.

Recovery and Restart
Defining the System Logger.
Dynamic Transaction Backout.
Emergency Restart.
Exclusive control.
Defining Recoverable Resources.
Considerations for backout.

CICS Utilities
The Dump and Trace utilities.
The CSD Utility.

Virtual Courses

ALL of our courses can be delivered virtually. And our Bath public schedule of courses are now available as live virtual sessions, using the popular Zoom Virtual Classroom and remote labs. Delegates can test their access at:

Public Courses

There are no up-coming events

On-Site Courses

Can't attend one of our public classes? Booking for multiple people?

All our courses are available on your site! Delivered for your staff, at your premises.

Contact us to find out more...