Enterprise Database Systems
Teradata Basics
Teradata Basics: Communication and Database Security
Teradata Basics: Data Storage and Access Methods
Teradata Basics: Relational Database and Data Warehouse Basics

Teradata Basics: Communication and Database Security

Course Number:
df_tera_a02_it_enus
Lesson Objectives

Teradata Basics: Communication and Database Security

  • start the course
  • identify the workstation attachment methods used to connect clients to a Teradata database
  • describe Teradata's mainframe attachment method that provides the interface between applications and TDP on a mainframe client
  • describe how the ODBC driver for Teradata is used for workstation attached systems
  • describe how the JDBC driver for Teradata is used for workstation attached systems
  • describe the OLE DB data provider for Teradata workstation attached systems
  • identify the different objects within a Teradata database
  • describe Teradata databases and users
  • identify the security elements used in a Teradata database
  • identify the different database privileges and roles in Teradata
  • identify the authentication methods, logon format and controls, and password format requirements
  • identify how Teradata protects data in a database
  • create a Teradata database
  • create a user in Teradata
  • create profiles in Teradata
  • create roles in Teradata
  • grant privileges directly to users in Teradata
  • manage Teradata database passwords
  • describe the login techniques and elements for logging into Teradata
  • login to a Teradata database using database authentication and authorization
  • login to a Teradata database using LDAP authentication and authorization
  • login to a Teradata database using single sign-on and sign-on as
  • create and use views to implement security measures in Teradata
  • create and use macros to implement security measures in Teradata
  • create and use UDFs to implement security measures in Teradata
  • describe and implement client communication and database security for a Teradata database

Overview/Description
As with any RDBMS the database needs to be security and accessible. Teradata is no exception and requires workstation and mainframe access to be configured using the communication methods provided by Teradata. The database also needs to be secured to ensure only authorized users can access it. This is provided through user accounts, privileges, profiles, and roles. This course will describe the workstation and mainframe attachment communication methods. It will also discuss and show how to configure security, including authorization and authentication for a database.

Target Audience
individuals looking to understand the features functions, and benefits of a Teradata database

Teradata Basics: Data Storage and Access Methods

Course Number:
df_tera_a03_it_enus
Lesson Objectives

Teradata Basics: Data Storage and Access Methods

  • start the course
  • describe how indexes are defined and used in Teradata
  • identify the different types of indexes that can be used in Teradata
  • describe the different types of primary indexes, UPI, NUPI, used in Teradata and how data is processed with the index
  • describe a NoPI object in Teradata and when it is used, and its benefits
  • describe PPI, and their advantages and disadvantages
  • create the different types of primary indexes in Teradata
  • partition tables using NoPI and PPI in Teradata
  • describe and create column partitioning on Teradata tables
  • describe secondary index use in a Teradata Database
  • describe data accessing using USI and NUSI in Teradata databases
  • create USI and NUSI in Teradata
  • identify the different types of join indexes that can be used in Teradata
  • identify when to use a join index in Teradata and their storage
  • create join indexes in Teradata
  • use the EXPLAIN request modifiers to determine the usefulness of indexes in a Teradata database
  • identify when and how a full-table scan is used to access data in Teradata tables
  • identify SQL queries that will use an index or perform a full-table scan in Teradata
  • describe how Teradata uses locking and the different types of locks
  • identifying the locking considerations in a Teradata database
  • describe how the two-phase locking and serializability works in Teradata
  • use the LOCKING request modifier in a Teradata SQL read operation
  • describe a deadlock and how they are handled in a Teradata database
  • describe how perm, spool, and TEMP are used to manage space for a user
  • estimate space requirements in Teradata
  • describe how fallback and journaling are used for data protection in Teradata
  • describe how cliques, hot standby, and RAID are used for data protection in Teradata
  • describe how RAID is used for data protection in Teradata
  • create the different types of indexes for a Teradata database, use locking, and describe performance availability features

Overview/Description
Teradata databases use indexes to store and access rows of data from tables. Indexes speed up the performance of data retrieval for users. Teradata offers various types of indexes which can be used based on the type of data and how it is accessed by the users. To control concurrency Teradata using different locking mechanisms. This course will discuss and show how to create the various primary and secondary indexes used by Teradata, as well as discuss the different locking mechanisms and the performance availability features, such as RAID, failover, cliques, and hot standby.

Target Audience
Individuals looking to understand the features functions, and benefits of a Teradata database

Teradata Basics: Relational Database and Data Warehouse Basics

Course Number:
df_tera_a01_it_enus
Lesson Objectives

Teradata Basics: Relational Database and Data Warehouse Basics

  • start the course
  • identify what Teradata has to offer
  • describe what a data warehouse is and how it is used with Teradata
  • describe an active data warehouse in Teradata
  • describe Teradata active solutions, including
  • describe the concepts of a relational database system and its terminology
  • describe the goals of a Teradata data warehouse and its architecture
  • describe data marts and when they are appropriate to use with Teradata
  • describe the enterprise data model
  • identify the database design life cycle and how logical data modeling is completed
  • describe the three-schema architecture
  • identify the Teradata logical data model frameworks and their pros and cons
  • describe performing entity relationships analysis for semantic data modeling
  • identify entities, attributes, and relationships in a E-R logical model
  • describe the normalization process
  • identify the capabilities of a Teradata database, its software, and tools
  • identify the main components of a Teradata architecture
  • describe the parsing engine in a Teradata database
  • describe the BYNET and how it is used in a Teradata database
  • describe AMPs and how they are used in a Teradata database
  • describe Teradatas virtual storage, its benefits, and considerations
  • identify how Teradata uses intelligent memory
  • describe how Teradata perform request processing using the dispatcher and AMPs
  • identify and describe the Teradata database and architecture concepts

Overview/Description
Teradata provides a relational database system for data storage that offers various tools and utilities for management, administration, and querying. It offers a high quality system using a parallel database architecture providing a 'share nothing' architecture. This course will provide information on the basics of Teradata including what a data warehouse is along with its architecture and design, an overview of a relational database system, and the hardware and software used by Teradata for the database architecture.

Target Audience
individuals looking to understand the features functions, and benefits of a Teradata database

Close Chat Live