• Online, Self-Paced
Course Description

As with any RDBMS the database needs to be security and accessible. Teradata is no exception and requires workstation and mainframe access to be configured using the communication methods provided by Teradata. The database also needs to be secured to ensure only authorized users can access it. This is provided through user accounts, privileges, profiles, and roles. This course will describe the workstation and mainframe attachment communication methods. It will also discuss and show how to configure security, including authorization and authentication for a database.

Learning Objectives

Client Communication

  • start the course
  • identify the workstation attachment methods used to connect clients to a Teradata database
  • describe Teradata's mainframe attachment method that provides the interface between applications and TDP on a mainframe client
  • describe how the ODBC driver for Teradata is used for workstation attached systems
  • describe how the JDBC driver for Teradata is used for workstation attached systems
  • describe the OLE DB data provider for Teradata workstation attached systems

Databases and Users

  • identify the different objects within a Teradata database
  • describe Teradata databases and users
  • identify the security elements used in a Teradata database
  • identify the different database privileges and roles in Teradata
  • identify the authentication methods, logon format and controls, and password format requirements
  • identify how Teradata protects data in a database
  • create a Teradata database
  • create a user in Teradata
  • create profiles in Teradata
  • create roles in Teradata
  • grant privileges directly to users in Teradata
  • manage Teradata database passwords

Login to Teradata

  • describe the login techniques and elements for logging into Teradata
  • login to a Teradata database using database authentication and authorization
  • login to a Teradata database using LDAP authentication and authorization
  • login to a Teradata database using single sign-on and sign-on as

Security

  • create and use views to implement security measures in Teradata
  • create and use macros to implement security measures in Teradata
  • create and use UDFs to implement security measures in Teradata

Practice: Client Communication and Security

  • describe and implement client communication and database security for a Teradata database

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.