Learn your way! Get started

ITF+ CompTIA IT, Part 3 of 3: Database and Security

with expert Mike Biocchi


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 7/20/2021
Level Beginner
Runtime 0h 56m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT. is a pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them. This course covers learning about Database and Security.

Prerequisites

none

Meet the expert

Dr. Michael Biocchi completed his PhD and has received his Masters of Science as well as his Bachelor of Computer Science. Michael is a Certified Information Systems Security Professional (CISSP). He is currently a full-time professor teaching a variety of computer science courses. These courses include: Artificial Intelligence, Security and Privacy, Project Management, PHP/MySQL, Distributed Systems, as well as many others. Michael also runs a small consulting business. He works with businesses in developing risk assessment, policy creation, business continuity planning, disaster recovery planning, and security awareness.

Course outline



Module 3

Database Concepts (05:00)
  • Introduction (00:08)
  • Databases (00:57)
  • Structure (01:17)
  • DBMS (00:58)
  • CRUD (01:30)
  • Summary (00:08)
Database Structure (08:06)
  • Introduction (00:08)
  • DB Structure (00:30)
  • Query (01:34)
  • Normalization (02:26)
  • Joins (03:19)
  • Summary (00:08)
Non Relational Data (04:01)
  • Introduction (00:08)
  • Non Relational Data (01:08)
  • Key Value Pairs (00:21)
  • Document Store (00:53)
  • Databases (00:36)
  • which database to use (00:45)
  • Summary (00:08)
Database Demo (13:30)
  • Introduction (00:08)
  • Database Demo (05:54)
  • Narrow Selection (07:19)
  • Summary (00:08)
Security Concepts (09:32)
  • Introduction (00:08)
  • Security Concepts (01:23)
  • Encryption (01:54)
  • Integrity (02:34)
  • Availability (01:31)
  • System Outage (01:53)
  • Summary (00:08)
Authentication (04:18)
  • Introduction (00:08)
  • Authentication (01:30)
  • BioMetrics (01:01)
  • Multi-Factor Authentication (01:31)
  • Summary (00:08)
Security Concerns (05:25)
  • Introduction (00:08)
  • Security Concerns (00:32)
  • Social Engineering (01:07)
  • Snooping (00:38)
  • Man in the Middle (00:51)
  • Privacy (00:15)
  • Extremes (01:44)
  • Summary (00:08)
Backups (06:16)
  • Introduction (00:08)
  • Backups (01:01)
  • How Much to Recover (01:31)
  • Hot Site (01:14)
  • Cold Site (00:38)
  • Warm Site (01:34)
  • Summary (00:08)