Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

9 hours 41 minutes
Video Transcription
Hi. Welcome to the intermediate Sequel course here on Savary. Dead I t.
My name is Kit Parker and in this lesson, we're just going to get started with the basics and includes going over. The prerequisites
must take a little bit more about myself.
We will discuss the necessary supplementary materials.
We also discussed the target audience and finally, we're going to go over the learning objectives for the entire course. Well, it seems like we do indeed have quite a bit to go over. So let's go ahead and get started.
So the first thing we want to discuss is the prerequisites
Now. This course is considered an intermediate course and will not include instruction on some basic concepts.
The following basic knowledge is expected
installing and setting up a local development environment where you can practice Sequel,
sequel joins inner left and right
procedures, functions,
triggers and constraints. Now you're not expected to be an expert in these concepts. You're just expected to know what they are and how to stand. She ate or implement them on a basic level. For example, you know how to create a view. You know how to create a procedure and so on.
If all these concepts sound foreign to you, I would recommend taking a look at our introduction to sequel course here on separate Dead I t.
And moving on.
Let me go ahead and tell you a little bit more about myself
again. My name is Kit Parker. I've worked as a system engineer, and I currently work is a B I developer or business intelligence developer.
I hold a bachelors off science in computer science, and I have a general love of technology.
If it's technology related, I typically want to learn about it.
Now let me go ahead and tell you a little bit more about myself. I'm an eight year Air Force veteran. I served in the Air Force from 5 2002 to 2013 so I've been in the private sector for about six years now,
and I really do have a passion for two, not technology. I've mentioned it more than once. I've been building my own computer since high school, and any time I need a new computer, I always order the components, assemble it myself and maybe over clock. It depends what kind of mood I'm in also like to learn about programming, obviously
various types of administration,
full stacked development and the list goes on and on. It is related to technology. I typically like to learn about it.
And the other thing about me that will be really useful for this course is that I have a ton of database experience now. How did that happen? Well, it seems that no matter where I'm working, what company, what position? I always end up working in a database to some extent, and the reason for that is
just because a lot of the applications, if not most, the applications in the world today are always going back to some database to save their data
for use later. And that requires the programmer that is interacting with that data set to understand how to interact with that data base, how to manipulate that data base and really facilitate a strong user experience. So I found myself working with different types of data bases a lot
so that completes this slide about me. Let's go ahead and move on. Let's discuss the supplementary materials
now. The supplementary materials required to make the most of this course include a personal computer with admin privileges were going to be installing software on this computer. So it's important that you have the appropriate religious that will allow you to install that software.
And if you're watching this course, this next one's probably solved. But you will also need Internet connectivity. We're going to begin in the most recent versions of the software over the Internet and installing it on our computer.
You'll also need a slide viewing program to make use of these Power point slides, such as Microsoft Power Point or Open Office or Libera Impress.
You'll also need a personal computer
capable off virtualization.
This will be required for ARV, Agron and Virtual Box installation.
Now there is a way to tell immediately if your computer is capable of virtualization. Now most modern computers are. It is possible that you could be on a computer. That is not, but the away that you tell if you have a computer that is capable of virtualization is a little bit involved, and we will cover how to check
when we get to the section for installing
virtual box.
Now, if you're really curious and you want to find out right away, go ahead and jump to that section and go through that lesson and you'll be able to figure out immediately if you have a personal computer that is capable of virtualization. But I suspect you do, because they are very common in today's market,
so that covers this supplementary materials. Let's move on to the target audience
now. The target audience for this course includes anyone that's going to or wants to learn about working with a database now that includes a huge portion of the I T forced programmers and administrators alike.
So this course is intended for programmers. Software engineers system personnel such as admin, zor system engineers,
business intelligence analysts, developers, full stack developers or technology focused college students.
And the reason it's has such a broad range is again because the data bases where all the data is, and many different types of technology professionals end up having to work with the database.
So if you find yourself in one of these camps than this course is for you,
and finally let's discuss the learning objectives for the entire course. So after you complete this entire course, it should be comfortable with the following
performing Intermediate queries using joins common table expressions or C. T. E s and views.
Perform complex segregation queries and sub queries.
Develop moderately complex database schema. US.
Developed complex triggering for enforcing business rules.
Developed complex events, procedures and functions.
Be able to implement solutions and transactions that preserve data integrity and finally utilized tools that speed up and protect development, also known as tooling.
So that completes this lesson. And the next lesson we're gonna take a more close. A closer look at all the components of this course in a course flyover. So I hope to see you there. And that completes this lesson. Thank you.
Up Next