learnex

 
Teradata
  • Course Contents 

    Track 1 :

    • Review of PX Concepts
    • Sequential Access
    • Standards
    • DBMS Access
    • PX Architecture
    • Transforming Data
    • Sorting Data

    Track 2:

    • Combining Data
    • Configuration Files
    • Extending PX
    • Meta Data Usage
    • Job Control
    • Testing

    Track 3:

    • Understand the Teradata Scalable Architecture
    • Understand how data is stored in Teradata
    • Describe how data gets into/out the system
    • Describe what the main components of Teradata are
    • Overview of Teradata Utilities & Tools
    • Use Teradata HASH functions for analyzing data placement
    • Primary & Secondary Indexes (Fundamentals)
    • Identify Primary Index Choice criteria
    • Describe uniqueness and how it affects space utilization
    • Explain row access, selection and selectivity
    • Choose between single and multi-column Primary Indexes
    • Describe single Nun-Unique Secondary Index (NUSI) access.
    • Descript Dual NUSI Access
    • Explain NUSI and Aggregate Processing
    • Compare NUSI vs. Full Table Scan (FTS)
    • Access Considerations & Locking Mechanisms
    • Analyze Optimizer Access scenarios
    • Explain partial value searches and data conversions
    • Identify the effects of conflicting data types
    • Describe different LOCK scenarios

    Track 4 :

    • Explain the Explain
    • Secondary Index Usage
    • Fundamental Tools
    • Join Optimization
    • Collecting Statistics
    • ETL Denormalization
    • Enhanced Indexing
    • Aggregation
    • CASE Statement
    • Between dates comparison
    • Upsert
    • Count & Distinct
    • Show
    • Drop / Create vs. Delete All
    • Derived, Volatile, Global
    • Referential Integrity processing
    • Qualification
    • CASTING For better JOINS

    Track 5 :

    • Unix basic Commands
    • Editing with VI Editor
    • Text handling Utilities
    • File System security and Management Utilities
    • Shell Scripting with practical examples
    • Perl Scripting with practical examples