Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Db2: Relational Database Design

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFRDB07

Db2: Relational Database Design
DURATION: 4 days

FEE: $1,980

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • Database Administrator
  • System Analyst
  • System Designer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Introduction
      • Examine the concepts and terminology of Db2 relational database design.
      • Examine and expand upon the concepts specific to the environment of the client organizations represented by the students in the class.
      • The concepts and terminology of the three models of database systems.
    2. Relational Model
      • Create a relational model.
      • Given a simple business application, design the entities that would solve the business problem using the relational model.
    3. Db2 Architecture
      • Acquire familiarity with the architecture around the address space.
      • Appreciate the flow of control among Database Services Address Space, System Services Address Space, Intersystem Resource Lock Manager, Distributed Data Facility, and Stored Procedure Address Space.
    4. Database Design: Synthetic Approach
      • Create a design using the synthetic approach.
      • Given a simple business application, design the keys using the synthetic approach.
    5. Database Design: Analytic Approach
      • Create a design using the analytic approach.
      • Given a simple business application, design the keys using the analytic approach.
    6. Other Design Topics
      • Implement optimum performance for Db2 databases in their environment.
      • Acquire proficiency with commits and batch programs.
      • Implement performance for SQL and applications with Data Access and EXPLAIN and the Db2 Optimizer and Program BIND Options.
    7. Table and View Design
      • Create a design for all the entities and associations.
      • Case study which incorporates topics from previous exercises.
    8. General Efficiency Techniques
      • Apply the efficiency techniques to redesign the entities and associations.
      • The results from the previous exercises are used.
    9. Factors Affecting Performance
      • Column types and their impact on performance.
      • Design tables for performance.
    10. EXPLAIN Statement
      • Examine the effect of various SELECT statements on the access path.
      • Instructor will provide the table and queries.
      • Queries will be processed through the EXPLAIN statement.
    11. Tuning Strategy
      • Become familiar with a system wide perspective of Db2 and applications.
      • Create a strategy for tuning a set of SQL application design and table statistics.
    12. Recovery and Security
      • Examine how security has evolved from protecting the network perimeter to protecting data at the source.
      • Learn how perimeter security is no longer effective in an age when data access models designed only for employees now extends to partners, vendors, and customers.
      • Instructor to provide examples and the case study.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.