1 – Understanding Database Types and Structures
- Topic 1A: Identify Relational and Non-Relational Databases
- Topic 1B: Understand Different Types of NoSQL Databases and Tools
- Topic 1C: Understand Relational Database Design
- Topic 1D: Identify Other Data Systems
2 – Recognizing Standards and Commands
- Topic 2A: Understand Standards and Principles
- Topic 2B: Examine Operating Systems and Command Line Scripting
3 – Running Scripts for Data and Data System
- Topic 3A: Create and Alter Objects Using Data Definition Languages
- Topic 3B: Manipulate Data using Data Manipulation Language
- Topic 3C: Work with Transactions
- Topic 3D: Perform Data Management Tasks
4 – Explaining the Impact of Programming on Database Operations
- Topic 4A: Work with Views
- Topic 4B: Understand Object Relational Mapping
- Topic 4C: Program with SQL
- Topic 4D: Write Functions
5 – Understanding Database Planning and Design
- Topic 5A: Understand Types of Architecture
- Topic 5B: Gather Data System Requirements
- Topic 5C: Review Documentation Requirements
6 – Implementing, Testing, and Deploying Databases
- Topic 6A: Prepare for Deployment
- Topic 6B: Conduct Testing and Other Quality Measures
- Topic 6C: Understand Validation Techniques and Methods
7 – Monitoring and Reporting on Database Performance
- Topic 7A: Consider Database Connectivity Needs
- Topic 7B: Monitor the Database
- Topic 7C: Understand and Address Deadlocks
8 – Understanding Common Data Maintenance
- Topic 8A: Explain Patch Managementance Processes
- Topic 8B: Ensure Database Performance
- Topic 8C: Ensure Database Integrity
9 – Understanding Governance and Regulatory Compliance
- Topic 9A: Understand the Importance of Protecting Data and Preventing Data Loss
- Topic 9B: Understand Data Retention Policies
- Topic 9C: Classify Data
- Topic 9D: Consider Global Jurisdiction and Regional Regulations
- Topic 9E: Understand Third-Party Agreements and Release Approvals
10 – Understand Data Encryption
- Topic 10B: Understand Data Masking
- Topic 10C : Describe Data Destruction Techniques
- Topic 10D: Audit Data Access
- Topic 10E: Audit Code and Changes
11 – Securing Data Access
- Topic 11A: Understand Identity and Access Management
- Topic 11B: Understand Access Controls
- Topic 11C: Understand Password Policies
- Topic 11D: Work with Service Accounts
12 – Securing the Database and Server
- Topic 12A: Utilize Physical Security
- Topic 12B: Utilize Logical Security
13 – Classifying Types of Attacks
- Topic 13A: Mitigate the SQL Injection Attack
- Topic 13B: Mitigate the Denial of Service (DoS) Attack
- Topic 13C: Mitigate the On-Path Attack
- Topic 13D: Mitigate the Brute Force Attack
- Topic 13E: Mitigate Social Engineering Attacks
- Topic 13F: Mitigate Malware
14 – Planning for Disaster Recovery
- Topic 14A: Plan for Disaster Recovery
- Topic 14B: Conduct DR Plan Testing
- Topic 14C: Transition/Failback to Normal Operations
15 – Implementing Backup and Restore Best Practices
- Topic 15A: Identify Types of Backups
- Topic 15B: Implement a Backup Strategy
- Topic 15C: Store and Purge Backups
In this course you will:
- Compare and contrast database structure types.
- Compare and contrast aspects of database planning and design.
- Given a scenario, implement data management tasks.
- Given a scenario, develop, modify, and run SQL code.
- Compare and contrast scripting methods and scripting environments.
- Explain the impact of programming on database operations.
- Explain database implementation, testing, and deployment phases.
- Given a scenario, produce documentation and use relevant tools.
- Explain the purpose of monitoring and reporting for database management and performance.
- Compare and contrast scripting methods and scripting environments.
- Explain common database maintenance processes.
- Explain the purpose of governance and regulatory compliance.
- Explain data security concepts.
- Given a scenario, implement policies and best practices related to authentication and authorization.
- Explain the purpose of database infrastructure security.
- Describe types of attacks and their effects on data systems.
- Explain the importance of disaster recovery and relevant techniques.
- Explain backup and restore best practices and processes.
In addition to good technical skills or aptitude to learn technology, good target candidates should have strong analytical and problem-solving skills, attention to detail, and the ability to work collaboratively with other IT professionals. They should also be able to manage multiple tasks and prioritize effectively.
Ten (10) business days’ notice is required to reschedule a class with no additional fees. Notify TOPTALENT LEARNING as soon as possible at 469-721-6100 or by written notification to info@toptalentlearning.com to avoid rescheduling penalties.
Please contact our team at 469-721-6100; we will gladly guide you through the online purchasing process.
You will receive a receipt and an enrollment confirmation sent to the email you submitted at purchase. Your enrollment email will have instructions on how to access the class. Any additional questions our team is here to support you. Please call us at 469-721-6100.
If a student is 15 minutes late, they risk losing their seat to a standby student. If a student is 30 minutes late or more, they will need to reschedule. A no-show fee will apply. Retakes are enrolled on a stand-by basis. The student must supply previously issued courseware. Additional fees may apply.
You will receive a ‘Certificate of Completion’ once you complete the class. If you purchased an exam voucher for the class, a team member from TOPTALENT LEARNING will reach out to discuss your readiness for the voucher and make arrangements to send it.