Explore MySQL: A Beginner’s Journey into Database Internals – Premium Edition
0h 0m 0s
English
Paid
Course description
Take a step-by-step dive into how MySQL works internally—from simple queries to advanced internal mechanisms. This course is designed for beginner developers, students, and anyone who wants to understand the internal workings of MySQL. You will start with basic SQL queries and gradually move on to study the following topics:
- B+-trees and indexes
- Buffer pool and caching mechanisms
- Transactions, MVCC, redo and undo logs
- Isolation levels, locks, and reliability guarantees
- Execution plan, types of JOIN and performance analysis
MySQL Trace Tool
You will have access to a high-performance tracing tool based on a specific version of MySQL. It allows you to observe how SQL statements are parsed, optimized, and executed in real time.
Books
Read Book Explore MySQL: A Beginner’s Journey into Database Internals – Premium Edition
| # | Title |
|---|---|
| 1 | Why Databases Are More Than Just Data Storage |
| 2 | What Really Happens in a MySQL Session_From Login to Logout |
| 3 | How Is MySQL Structured Internally |
| 4 | Getting to Know Indexes_What They Are and Why They Matter |
| 5 | B+ Trees vs. Hash Indexes_What Makes MySQL Choose the Tree |
| 6 | How MySQL Finds Rows in a B+ Tree_A Step-by-Step Example |
| 7 | Understanding B+ Tree Height and Its Performance Impact |
| 8 | Avoiding Table Lookups with Covering Indexes |
| 9 | The Buffer Pool Exposed_What Really Happens to Your Pages |
| 10 | Inside MySQL_Writes From Buffer Pool to Disk |
| 11 | Introduction to Redo Logs Their Role and How They Work |
| 12 | Understanding Undo Logs_When and Why They're Used |
| 13 | What Is MVCC and How Does It Work in MySQL |
| 14 | What Are Binlogs and What Are They Used For |
| 15 | A Deep Yet Simple Look at Transactions |
| 16 | How MySQL Guarantees Atomic Transactions |
| 17 | What Consistency Means in Databases and How It's Enforced |
| 18 | MySQL Isolation Levels A Practical Guide |
| 19 | How MySQL Makes Transactions Durable with Logging |
| 20 | What Are Checkpoints_How They Help with Durability and Performance |
| 21 | Locks in MySQL_An Easy Guide to Types and Use Cases |
| 22 | What Is a GAP Lock_Why Is It Confusing |
| 23 | How MySQL Creates a Query Execution Plan |
| 24 | Why Some Queries Use Full Index Scans |
| 25 | A Beginner’s Guide to How JOINs Work in MySQL |
| 26 | Why JOINs Often Outperform Correlated Subqueries |
| 27 | What Really Happens When You Run an INSERT |
| 28 | What Happens Internally During an UPDATE |
| 29 | What Makes Hotspot Updates a Pain for Performance |
| 30 | What Happens Internally During a DELETE |
| 31 | Why Many Companies Discourage Using DELETE to Remove Data |
| 32 | Why DROP TABLE Can Be Shockingly Fast |
| 33 | Why the First Query Is Often Slow Understanding Cold Reads |
| 34 | Temporary Files in MySQL_When and Why They're Used |
| 35 | What Is Rate Limiting in Databases and When Does It Matter |
| 36 | Big Transactions Big Trouble_What You Should Know |
| 37 | Why Even Simple Queries Can Sometimes Be Slow |
| 38 | What Causes MySQL to Jitter |
| 39 | Which Is Better Random or Sequential Primary Keys |
| 40 | When and Why Indexes Become Ineffective |
| 41 | Does a Covering Index Always Prevent Table Lookups |
| 42 | Pagination Optimization Avoiding Performance Hits from Large Offsets |
| 43 | Why Two Similar SQLs Perform Very Differently |
| 44 | Read Committed vs Repeatable Read What Developers Should Know |
| 45 | Transaction Isolation Is It Really Guaranteed |
| 46 | Hidden Transaction Misuses That Developers Overlook |
| 47 | Common SQL Pitfalls That Kill Performance |
| 48 | Must-Know Config Settings That Affect Query Speed |
| 49 | How to Use Trace Logs to Diagnose Problems |
| 50 | AI-Powered SQL Analyzing From Execution Plans to Root Causes |
Comments
0 commentsWant to join the conversation?
Sign in to commentSimilar courses
Web API From Start to Finish
Sources: iamtimcorey.com (Tim Corey)
Application Programming Interfaces (APIs) are software that send information back and forth between a program and a user. The entire web runs on APIs! They are required for mose...
17 hours 59 minutes 54 seconds
DBMS
Sources: takeUforward
This course is dedicated to the study of Database Management Systems (DBMS) - technologies that allow for efficient storage, processing, and protection of data.
21 hours 30 minutes 50 seconds
Web Security Dev Academy - 12-week online program
Sources: Bartosz Pietrucha
Master the full picture of web security and learn to develop secure full-stack applications with reliable authentication, protection against vulnerabilities...
16 hours 37 minutes 20 seconds