Course description
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT. is a pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them. This course covers learning about Database and Security.
Prerequisites
none
Meet the expert
Dr. Michael Biocchi completed his PhD and has received his Masters of Science as well as his Bachelor of Computer Science. Michael is a Certified Information Systems Security Professional (CISSP). He is currently a full-time professor teaching a variety of computer science courses. These courses include: Artificial Intelligence, Security and Privacy, Project Management, PHP/MySQL, Distributed Systems, as well as many others. Michael also runs a small consulting business. He works with businesses in developing risk assessment, policy creation, business continuity planning, disaster recovery planning, and security awareness.
Course outline
Module 3
Database Concepts (05:00)
- Introduction (00:08)
- Databases (00:57)
- Structure (01:17)
- DBMS (00:58)
- CRUD (01:30)
- Summary (00:08)
Database Structure (08:06)
- Introduction (00:08)
- DB Structure (00:30)
- Query (01:34)
- Normalization (02:26)
- Joins (03:19)
- Summary (00:08)
Non Relational Data (04:01)
- Introduction (00:08)
- Non Relational Data (01:08)
- Key Value Pairs (00:21)
- Document Store (00:53)
- Databases (00:36)
- which database to use (00:45)
- Summary (00:08)
Database Demo (13:30)
- Introduction (00:08)
- Database Demo (05:54)
- Narrow Selection (07:19)
- Summary (00:08)
Security Concepts (09:32)
- Introduction (00:08)
- Security Concepts (01:23)
- Encryption (01:54)
- Integrity (02:34)
- Availability (01:31)
- System Outage (01:53)
- Summary (00:08)
Authentication (04:18)
- Introduction (00:08)
- Authentication (01:30)
- BioMetrics (01:01)
- Multi-Factor Authentication (01:31)
- Summary (00:08)
Security Concerns (05:25)
- Introduction (00:08)
- Security Concerns (00:32)
- Social Engineering (01:07)
- Snooping (00:38)
- Man in the Middle (00:51)
- Privacy (00:15)
- Extremes (01:44)
- Summary (00:08)
Backups (06:16)
- Introduction (00:08)
- Backups (01:01)
- How Much to Recover (01:31)
- Hot Site (01:14)
- Cold Site (00:38)
- Warm Site (01:34)
- Summary (00:08)