jypi
ExploreChatWays to LearnAbout

jypi

  • About Us
  • Our Mission
  • Team
  • Careers

Resources

  • Ways to Learn
  • Blog
  • Help Center
  • Community Guidelines
  • Contributor Guide

Legal

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Content Policy

Connect

  • Twitter
  • Discord
  • Instagram
  • Contact Us
jypi

© 2026 jypi. All rights reserved.

📊 Data & Tech Skills

Relational Databases Certification

Master the theory, design, and operation of relational database systems from first principles to production. This certif...

14
Views
Relational Databases Certification

Sections

1. Relational Concepts and Architecture
5 views

Establish core relational theory, database components, and system architecture across major RDBMS platforms.

15 topics (15 versions)
1.1Evolution of Databases
1.2Relational Model Principles
1.3Tuples, Attributes, and Relations
1.4Relational Algebra Basics
1
1.5Keys and Identifiers Overview
1.6Set Theory Foundations
1
1.7Schema, Catalog, and Instance
1
1.8Client-Server Architecture
1
1.9Storage Engines Overview
1
1.10Pages, Extents, and Buffer Pool
1.11Write-Ahead Logging Concept
1.12ANSI/ISO SQL Standards
1.13Vendor Dialect Differences
1.14System Catalogs and Metadata
1.15Choosing an RDBMS Platform

2. SQL Fundamentals: DDL, DML, and Querying
0 views

Learn core SQL syntax for defining schemas, manipulating data, and retrieving results accurately and efficiently.

15 topics (15 versions)
2.1Installing and Connecting to an RDBMS
2.2Databases, Schemas, and Namespaces
2.3Data Types and Null Semantics
2.4Creating and Dropping Tables
2.5Inserting, Updating, Deleting Rows
2.6Basic SELECT and WHERE Filtering
2.7ORDER BY, LIMIT, and OFFSET
2.8Expressions and Built-in Functions
2.9Aliases and Column Computations
2.10Simple Aggregates and GROUP BY
2.11HAVING and Filtering Aggregates
2.12String and Date Operations
2.13Comments and Query Formatting
2.14Transactions and AUTOCOMMIT Basics
2.15Using CLI and GUI Tools

3. Data Modeling and Normalization
7 views

Design high-quality relational schemas through ER modeling, normalization, and pragmatic denormalization choices.

15 topics (15 versions)
3.1Requirements Gathering Techniques
1
3.2Entities and Attributes
1
3.3ER Diagrams and Notation
1
3.4Relationships and Cardinality
3.5Optionality and Participation
3.6Weak and Strong Entities
3.7Surrogate vs Natural Keys
3.8Normal Forms 1NF to 3NF
3.9BCNF and Higher Normal Forms
3.10Denormalization Trade-offs
3.11Associative (Junction) Tables
3.12Inheritance and Subtype Modeling
1
3.13Temporal and Audit Modeling
1
3.14Naming Conventions and Standards
1
3.15Schema Evolution and Refactoring
1

4. Keys, Constraints, and Data Integrity
0 views

Enforce correctness with keys and constraints that maintain referential and business rule integrity.

15 topics (15 versions)
4.1Primary Keys and Candidate Keys
4.2Unique and Not Null Constraints
4.3Foreign Keys and Referential Actions
4.4Check Constraints and Domains
4.5Default Values and Generated Columns
4.6Identity and Sequence Generators
4.7Cascading Updates and Deletes
4.8Deferred and Immediate Constraints
4.9Composite Keys and Surrogates
4.10Data Validation Patterns
4.11Business Rules in the Database
4.12Handling Orphaned Records
4.13Enforcing Complex Constraints
4.14Data Quality and Profiling
4.15Constraint Design Anti-Patterns

5. Joins, Subqueries, Views, and Set Operations
0 views

Master relational querying patterns for combining, filtering, and shaping datasets across multiple tables.

15 topics (15 versions)
5.1Inner and Outer Joins
5.2Cross and Self Joins
5.3Semi and Anti Joins
5.4Join Conditions and Predicates
5.5Join Order and Associativity
5.6Correlated Subqueries
5.7EXISTS and IN Patterns
5.8Scalar and Table Subqueries
5.9Derived Tables and Inline Views
5.10Common Table Expressions
5.11Views: Creation and Security
5.12Updatable Views and Limitations
5.13UNION, INTERSECT, EXCEPT
5.14Pivot and Unpivot Techniques
5.15Working with Hierarchies

6. Indexes, Execution Plans, and Query Optimization
1 views

Optimize workload performance using indexing strategies, plan analysis, and cost-based tuning techniques.

15 topics (15 versions)
6.1Clustered vs Nonclustered Indexes
6.2B-Tree, Hash, and Bitmap Indexes
1
6.3Composite and Covering Indexes
6.4Index Selectivity and Cardinality
6.5SARGability and Predicate Design
6.6Statistics and Histograms
6.7Execution Plan Anatomy
6.8Join Algorithms: NL, Hash, Merge
6.9Cost-Based vs Rule-Based Optimizers
6.10Rewriting Queries for Performance
6.11Index Maintenance and Fill Factor
6.12Partitioning and Pruning
6.13Materialized Views and Caching
6.14Parameter Sniffing and Recompiles
6.15Performance Troubleshooting Workflow

7. Transactions, Concurrency, and Isolation
0 views

Guarantee consistency under load with ACID transactions, locking, MVCC, and robust retry strategies.

15 topics (15 versions)
7.1ACID Properties Explained
7.2Transaction Boundaries and Scope
7.3Autocommit vs Explicit Transactions
7.4Isolation Levels Overview
7.5Read Phenomena: Dirty, Nonrepeatable, Phantom
7.6Lock Types and Granularity
7.7Blocking and Deadlocks
7.8Deadlock Detection and Avoidance
7.9MVCC Concepts and Snapshots
7.10Optimistic vs Pessimistic Concurrency
7.11Savepoints and Partial Rollbacks
7.12Long-Running Transactions
7.13Idempotency and Retry Patterns
7.14Consistency and Business Invariants
7.15Testing Concurrency Scenarios

8. Advanced SQL and Procedural Features
0 views

Use advanced querying, analytics, and server-side programming to implement complex data logic.

15 topics (15 versions)
8.1Window Functions Fundamentals
8.2Ranking and Aggregate Windows
8.3Framing and Ordering Options
8.4Advanced CTEs and Recursion
8.5Graph and Hierarchical Queries
8.6MERGE and Upsert Patterns
8.7Analytic and Statistical Functions
8.8JSON and XML in Relational Tables
8.9Full-Text Search Basics
8.10Stored Procedures and Functions
8.11Triggers and Event-Driven Logic
8.12Error Handling and Transactions
8.13Dynamic SQL and SQL Injection Risks
8.14Polymorphic and Table-Valued Functions
8.15Working with Large Objects

9. Operations, Security, and Monitoring
0 views

Administer databases with secure configurations, access control, change management, and observability.

15 topics (15 versions)
9.1Instance and Database Configuration
9.2User Management and Roles
9.3Authentication Methods
9.4Authorization and RBAC Models
9.5Row-Level and Column-Level Security
9.6Data Encryption at Rest
9.7TLS and Encryption in Transit
9.8Auditing and Compliance Logging
9.9GDPR, HIPAA, and PCI Considerations
9.10Resource Governance and Workload Management
9.11Monitoring Metrics and Alerts
9.12Query Store and Performance Baselines
9.13Error Logs and Diagnostics
9.14Change Management and Migrations
9.15ORMs and Application Connectivity

10. Backup, Recovery, Replication, and Cloud Operations
0 views

Build resilient, scalable deployments with backups, disaster recovery, replication, and cloud-native automation.

15 topics (15 versions)
10.1Backup Strategies and Policies
10.2Full, Differential, and Incremental Backups
10.3Point-in-Time Recovery
10.4Restore Validation and DR Drills
10.5High Availability Architectures
10.6Replication Topologies and Lag
10.7Failover and Switchover Procedures
10.8Logical vs Physical Replication
10.9Sharding and Partitioned Architectures
10.10Cloud RDS and Managed Services
10.11Infrastructure as Code for Databases
10.12Automated Provisioning and Patching
10.13Multi-Region and Read Replicas
10.14Cost Optimization in the Cloud
10.15Observability and SRE Practices
Earn your certificate

Sign in to track your progress

When you’re signed in, we’ll remember which sections you’ve viewed. Finish all sections and you’ll unlock a downloadable certificate to keep or share.