• Online, Self-Paced
Course Description

A database is used by organizations to store their data, and allow their employees to access, update, and manage it. Organizations use a Database Management System, also known as a DBMS to control, store, organization and retrieve that data for the users through end-user applications. There are multiple types of database, such as flat-file, network, and hierarchical. The most widely used database is the relational database, which is based on a mathematical theory. This course discusses what database and DBMSs are, the different database models and the database architectures. It also discusses what relational databases are, its components, and how relational databases were identified by Dr. Edgar Codd, including the 12 rules that were identified that a database should adhere to be considered relational.

Learning Objectives

Database Systems and the Architecture

  • start the course
  • describe a database
  • describe a DBMS, its components, and advantages for users
  • identify different types of database users
  • identify the requirements that make up a good database
  • identify the characteristics of a centralized DBMS architectures
  • identify the characteristics of a client/server DBMS architecture
  • identify the characteristics of an n-tier DBMS architecture
  • identify the characteristics of a distributed and parallel DBMS architecture
  • describe the features and characteristics of flat-file, hierarchical, and XML database models
  • describe the network and relational database models
  • describe the object-oriented and object-relational database models

Relational Databases

  • identify the 13 rules published by Dr. Codd to help determine whether a database is relational
  • describe the features and components of a RDBMS
  • describe entity-relationship modeling for a RDBMS
  • describe the three levels of a DBS architecture
  • identify the characteristics of a table in the conceptual level of the database architecture
  • describe the types of constraints that can be used for data integrity
  • describe the different types of keys that can be implemented on a column in a table
  • describe indexes, triggers, and stored procedures and how they help to access and manage data
  • describe the 1NF and 2NF in normalization for a database
  • describe 3NF and BCNF in normalization for a database
  • describe 4NF and 5NF in normalization for a database
  • identify the benefits of a well normalized database for users

Practice: Database Concepts

  • identify the different database architectures, models, and perform normalization on a database

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.