PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
CONTENT AND OBJECTIVES:
Examine the concepts and terminology of Db2 relational database design.
Examine and expand upon the concepts specific to the environment of the client organizations represented by the students in the class.
The concepts and terminology of the three models of database systems.
Create a relational model.
Given a simple business application, design the entities that would solve the business problem using the relational model.
Acquire familiarity with the architecture around the address space.
Appreciate the flow of control among Database Services Address Space, System Services Address Space, Intersystem Resource Lock Manager, Distributed Data Facility, and Stored Procedure Address Space.
Database Design: Synthetic Approach
Create a design using the synthetic approach.
Given a simple business application, design the keys using the synthetic approach.
Database Design: Analytic Approach
Create a design using the analytic approach.
Given a simple business application, design the keys using the analytic approach.
Other Design Topics
Implement optimum performance for Db2 databases in their environment.
Acquire proficiency with commits and batch programs.
Implement performance for SQL and applications with Data Access and EXPLAIN and the Db2 Optimizer and Program BIND Options.
Table and View Design
Create a design for all the entities and associations.
Case study which incorporates topics from previous exercises.
General Efficiency Techniques
Apply the efficiency techniques to redesign the entities and associations.
The results from the previous exercises are used.
Factors Affecting Performance
Column types and their impact on performance.
Design tables for performance.
Examine the effect of various SELECT statements on the access path.
Instructor will provide the table and queries.
Queries will be processed through the EXPLAIN statement.
Become familiar with a system wide perspective of Db2 and applications.
Create a strategy for tuning a set of SQL application design and table statistics.
Recovery and Security
Examine how security has evolved from protecting the network perimeter to protecting data at the source.
Learn how perimeter security is no longer effective in an age when data access models designed only for employees now extends to partners, vendors, and customers.
Instructor to provide examples and the case study.
Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.
SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.