Skip to main content

Explore MySQL: A Beginner’s Journey into Database Internals – Premium Edition

0h 0m 0s
English
Paid

Course description

Take a step-by-step dive into how MySQL works internally—from simple queries to advanced internal mechanisms. This course is designed for beginner developers, students, and anyone who wants to understand the internal workings of MySQL. You will start with basic SQL queries and gradually move on to study the following topics:

  • B+-trees and indexes
  • Buffer pool and caching mechanisms
  • Transactions, MVCC, redo and undo logs
  • Isolation levels, locks, and reliability guarantees
  • Execution plan, types of JOIN and performance analysis

MySQL Trace Tool

You will have access to a high-performance tracing tool based on a specific version of MySQL. It allows you to observe how SQL statements are parsed, optimized, and executed in real time.

Books

Read Book Explore MySQL: A Beginner’s Journey into Database Internals – Premium Edition

#Title
1Why Databases Are More Than Just Data Storage
2What Really Happens in a MySQL Session_From Login to Logout
3How Is MySQL Structured Internally
4Getting to Know Indexes_What They Are and Why They Matter
5B+ Trees vs. Hash Indexes_What Makes MySQL Choose the Tree
6How MySQL Finds Rows in a B+ Tree_A Step-by-Step Example
7Understanding B+ Tree Height and Its Performance Impact
8Avoiding Table Lookups with Covering Indexes
9The Buffer Pool Exposed_What Really Happens to Your Pages
10Inside MySQL_Writes From Buffer Pool to Disk
11Introduction to Redo Logs Their Role and How They Work
12Understanding Undo Logs_When and Why They're Used
13What Is MVCC and How Does It Work in MySQL
14What Are Binlogs and What Are They Used For
15A Deep Yet Simple Look at Transactions
16How MySQL Guarantees Atomic Transactions
17What Consistency Means in Databases and How It's Enforced
18MySQL Isolation Levels A Practical Guide
19How MySQL Makes Transactions Durable with Logging
20What Are Checkpoints_How They Help with Durability and Performance
21Locks in MySQL_An Easy Guide to Types and Use Cases
22What Is a GAP Lock_Why Is It Confusing
23How MySQL Creates a Query Execution Plan
24Why Some Queries Use Full Index Scans
25A Beginner’s Guide to How JOINs Work in MySQL
26Why JOINs Often Outperform Correlated Subqueries
27What Really Happens When You Run an INSERT
28What Happens Internally During an UPDATE
29What Makes Hotspot Updates a Pain for Performance
30What Happens Internally During a DELETE
31Why Many Companies Discourage Using DELETE to Remove Data
32Why DROP TABLE Can Be Shockingly Fast
33Why the First Query Is Often Slow Understanding Cold Reads
34Temporary Files in MySQL_When and Why They're Used
35What Is Rate Limiting in Databases and When Does It Matter
36Big Transactions Big Trouble_What You Should Know
37Why Even Simple Queries Can Sometimes Be Slow
38What Causes MySQL to Jitter
39Which Is Better Random or Sequential Primary Keys
40When and Why Indexes Become Ineffective
41Does a Covering Index Always Prevent Table Lookups
42Pagination Optimization Avoiding Performance Hits from Large Offsets
43Why Two Similar SQLs Perform Very Differently
44Read Committed vs Repeatable Read What Developers Should Know
45Transaction Isolation Is It Really Guaranteed
46Hidden Transaction Misuses That Developers Overlook
47Common SQL Pitfalls That Kill Performance
48Must-Know Config Settings That Affect Query Speed
49How to Use Trace Logs to Diagnose Problems
50AI-Powered SQL Analyzing From Execution Plans to Root Causes

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Web API From Start to Finish

Web API From Start to Finish

Sources: iamtimcorey.com (Tim Corey)
Application Programming Interfaces (APIs) are software that send information back and forth between a program and a user. The entire web runs on APIs! They are required for mose...
17 hours 59 minutes 54 seconds
DBMS

DBMS

Sources: takeUforward
This course is dedicated to the study of Database Management Systems (DBMS) - technologies that allow for efficient storage, processing, and protection of data.
21 hours 30 minutes 50 seconds
Web Security Dev Academy - 12-week online program

Web Security Dev Academy - 12-week online program

Sources: Bartosz Pietrucha
Master the full picture of web security and learn to develop secure full-stack applications with reliable authentication, protection against vulnerabilities...
16 hours 37 minutes 20 seconds