Course Details

Previous Page


Teradata Basics: Communication and Database Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number


Overview/Description
As with any RDBMS the database needs to be security and accessible. Teradata is no exception and requires workstation and mainframe access to be configured using the communication methods provided by Teradata. The database also needs to be secured to ensure only authorized users can access it. This is provided through user accounts, privileges, profiles, and roles. This course will describe the workstation and mainframe attachment communication methods. It will also discuss and show how to configure security, including authorization and authentication for a database.

Target Audience
individuals looking to understand the features functions, and benefits of a Teradata database

Prerequisites
None

Expected Duration (hours)
2.4

Lesson Objectives

Teradata Basics: Communication and Database Security

  • start the course
  • identify the workstation attachment methods used to connect clients to a Teradata database
  • describe Teradata's mainframe attachment method that provides the interface between applications and TDP on a mainframe client
  • describe how the ODBC driver for Teradata is used for workstation attached systems
  • describe how the JDBC driver for Teradata is used for workstation attached systems
  • describe the OLE DB data provider for Teradata workstation attached systems
  • identify the different objects within a Teradata database
  • describe Teradata databases and users
  • identify the security elements used in a Teradata database
  • identify the different database privileges and roles in Teradata
  • identify the authentication methods, logon format and controls, and password format requirements
  • identify how Teradata protects data in a database
  • create a Teradata database
  • create a user in Teradata
  • create profiles in Teradata
  • create roles in Teradata
  • grant privileges directly to users in Teradata
  • manage Teradata database passwords
  • describe the login techniques and elements for logging into Teradata
  • login to a Teradata database using database authentication and authorization
  • login to a Teradata database using LDAP authentication and authorization
  • login to a Teradata database using single sign-on and sign-on as
  • create and use views to implement security measures in Teradata
  • create and use macros to implement security measures in Teradata
  • create and use UDFs to implement security measures in Teradata
  • describe and implement client communication and database security for a Teradata database
  • Course Number:
    df_tera_a02_it_enus