• Online, Self-Paced
Course Description

Teradata databases use indexes to store and access rows of data from tables. Indexes speed up the performance of data retrieval for users. Teradata offers various types of indexes which can be used based on the type of data and how it is accessed by the users. To control concurrency Teradata using different locking mechanisms. This course will discuss and show how to create the various primary and secondary indexes used by Teradata, as well as discuss the different locking mechanisms and the performance availability features, such as RAID, failover, cliques, and hot standby.

Learning Objectives

Primary and Partitioned Indexes

  • start the course
  • describe how indexes are defined and used in Teradata
  • identify the different types of indexes that can be used in Teradata
  • describe the different types of primary indexes, UPI, NUPI, used in Teradata and how data is processed with the index
  • describe a NoPI object in Teradata and when it is used, and its benefits
  • describe PPI, and their advantages and disadvantages
  • create the different types of primary indexes in Teradata
  • partition tables using NoPI and PPI in Teradata
  • describe and create column partitioning on Teradata tables

Secondary and Join Indexes

  • describe secondary index use in a Teradata Database
  • describe data accessing using USI and NUSI in Teradata databases
  • create USI and NUSI in Teradata
  • identify the different types of join indexes that can be used in Teradata
  • identify when to use a join index in Teradata and their storage
  • create join indexes in Teradata
  • use the EXPLAIN request modifiers to determine the usefulness of indexes in a Teradata database
  • identify when and how a full-table scan is used to access data in Teradata tables
  • identify SQL queries that will use an index or perform a full-table scan in Teradata


  • describe how Teradata uses locking and the different types of locks
  • identifying the locking considerations in a Teradata database
  • describe how the two-phase locking and serializability works in Teradata
  • use the LOCKING request modifier in a Teradata SQL read operation
  • describe a deadlock and how they are handled in a Teradata database

Data Protection

  • describe how perm, spool, and TEMP are used to manage space for a user
  • estimate space requirements in Teradata
  • describe how fallback and journaling are used for data protection in Teradata
  • describe how cliques, hot standby, and RAID are used for data protection in Teradata
  • describe how RAID is used for data protection in Teradata

Practice: Indexes and Locking

  • create the different types of indexes for a Teradata database, use locking, and describe performance availability features

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.


If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.