• Online, Self-Paced
Course Description

As with any development skill in the industry, learning the core fundamentals creates a foundation. This course describes the SQL views in more detail, defining the various views and their management, and introduces concepts such as Transactions and how to group statements, Transact-SQL, and transaction logs. In this course, you will learn about one of the most important aspects of SQL its security. You will learn about defining the lock system and various levels of security access and management as well as many other operators and functions used in SQL statements. This includes the setup and installation of security architecture. By the end of these courses, you will be well on your way to creating efficient and easily manageable databases and have fun while doing it.

Learning Objectives

The Big Picture

  • start the course
  • describe views and their relation to the SQL architecture
  • use SQL to create a simple view
  • use the various views in SQL architecture
  • use SQL to update a view
  • use SQL to drop views

Grouping Statements Using Transactions

  • describe the various transactions and their use in SQL
  • describe the various ACID transactions and their use
  • use Transactions in SQL
  • use ROLLBACK statement in SQL
  • use the COMMIT statement in SQL
  • use ROLLBACK and COMMIT in an SQL query
  • use SQL to define Transact-SQL and the relation with transaction types
  • use transaction logs and define their purpose in SQL

Implementing Transactions with Locks

  • describe locks and their use in SQL
  • use SQL to introduce the various levels of locking and their use
  • use SQL to describe the various lock modes
  • use SQL to identify the levels of locking
  • use SQL to create an implementation using locks

Restricting Access of Data

  • describe the various security concepts in SQL
  • use SQL to describe the philosophy behind User IDs and their use
  • use SQL to describe how to create a user and how to manage them
  • use SQL to describe the use of group IDs and roles in
  • use SQL to define the use of privileges and restrictions
  • use SQL security processes to create a user and a group with privileges

Practice: Transactions & SQL Security Architecture

  • describe views, transactions, and the security model and the relation to SQL

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.