• Online, Self-Paced
Course Description

As with any RDBMS, the database needs to be secured to ensure only authorized users can access it. Discover how to configure security, including logging on, views, macros, and UDFs.

Learning Objectives

{"describe the login techniques and elements for logging into Teradata"}

Framework Connections