Home
Videos uploaded by user “Brian Green”
SQL Lab 1 - Exploring AdventureWorks
 
06:10
This lab is intended to acclimate students with Management Studio Express using the AdventureWorks database.
Views: 8169 Brian Green
Logical Database Design and E-R Diagrams
 
32:23
This video explores logical database design (a pre-cursor to physical database design) and demonstrates the use of Entity Relationship Diagrams.
Views: 81387 Brian Green
OO Systems Analysis and Design - Essentials of Design (Part 7)
 
30:43
In the first half of the course, we learned techniques for systems analyses. These activities were focused on understanding what the new system needs to accomplish. Using the deliverables from our analysis, we can begin designing a system. In essence, during the analysis phase, we focused on understanding the new system; in design activities we focus on the solution (i.e., how the system will be built, the components, etc).
Views: 6729 Brian Green
Database Normalization
 
26:53
An overview on how to normalize a database for a relational database management system.
Views: 12727 Brian Green
OO Systems Analysis and Design - OO Design (Part 9)
 
45:28
In this unit we expand on object oriented approaches to design. We will apply OO design principals to architectural design, learn about design class diagrams, CRC cards, communications diagrams, and other OO techniques. Of course, all of this will rely on the OO techniques we employed in the analysis phase.
Views: 6600 Brian Green
Visio 2013 - Database DIagram (Crows Foot Notation)
 
22:20
This video demonstrates using Crow's Foot Notation to create a database diagram using MS Visio 2013.
Views: 53689 Brian Green
Creating a Database with Tables and Relationships (MS SQL)
 
29:00
Creating a Database with Tables and Relationships using Microsoft Management Studio Express for Microsoft SQL Server 2008 Express
Views: 131800 Brian Green
Systems Analysis and Design - Designing the User/System Interface (Part 8)
 
38:03
In the first half of the course, we learned techniques for systems analyses. These activities were focused on understanding what the new system needs to accomplish. Using the deliverables from our analysis, we can begin designing a system. In essence, during the analysis phase, we focused on understanding the new system; in design activities we focus on the solution (i.e., how the system will be built, the components, etc). Where before we focused on more soft skills (like business processes), in this unit we begin using more technical skills.
Views: 7775 Brian Green
OO Systems Analysis and Design Overview (Part 2)
 
57:46
We will learn about the systems development life cycle, which we will be using and referencing throughout the course. We apply the SDLC and the core processes to a simple example, and demonstrate some OO-SAD project deliverables (which are covered in much more detail later).
Views: 37960 Brian Green
Object Oriented Systems Analysis and Design Use Cases (Part 4)
 
31:32
A description of use cases, how to determine appropriate use cases for a system being designed, and UML syntax for use case models.
Views: 18890 Brian Green
OO Systems Analysis and Design - Domain Class Modeling (Part 5)
 
01:04:18
This video explains Domain Class Model Diagramming for systems analysis in UML (Note: class diagrams for systems design are discussed in another video). Structured techniques for data modeling are also presented, such as E-R diagrams.
Views: 18327 Brian Green
Database Project for MS SQL Server
 
39:05
This project uses the Westlake Database project. It adds the tables needed to patient visits / symptoms, adds stored procedures, triggers and indexes, and asks the student to create views using query skills learned previously. The importance of database security to prevent SQL injection attacks is also demonstrated, and mitigated through the use of stored procedures. In addition, indexes are discussed and demonstrated.
Views: 32842 Brian Green
Systems Analysis & Design - Investigating System Requirements (Part 3)
 
44:34
In this presentation, I will discuss exactly what requirements are, and why it is important to accurately capture them. We will look at specific techniques to gathering requirements, and then discuss some modeling techniques for demonstrating our understanding of the requirements (which will be covered in more detail later).
Views: 21031 Brian Green
Systems Analysis and Design - Extending the Requirements Models (Part 6)
 
48:01
Once the requirements have been determined, the analyst begins modeling those requirements with use case and class diagrams. We can further decompose the user cases with activity diagrams, and decompose our classes with state machine diagrams. This helps us demonstrate and refine our understanding of the system we will eventually be designing, and we can also create system sequence diagrams to demonstrate use cases. These diagram techniques are not only useful for helping us analyze and understand the current systems and needs in the new system to be designed, but it also introduces us to these diagramming techniques which we will be using in more detail for our systems design.
Views: 9442 Brian Green
Introduction to OO Systems Analysis and Design Course (Part 1)
 
10:20
This is a brief introduction to Drexel's Systems Analysis and Design course. This includes what to expect throughout the course, and some thoughts about success for this course.
Views: 67538 Brian Green
Troubleshooting DICOM using StoreSCP and StoreSCU
 
11:25
StoreSCP and StoreSCU are tools that can be downloaded from http://dicom.offis.de which are very useful for simulating an SCU (device sending DICOM) and an SCP (device receiving DICOM). At UltraRAD, we frequently use these tools to test connections and settings, or when we need to test functionality against our applications where we want to use a third party application, Many PACS administrators will find these helpful tools, regardless of the PACS, archive or nodes. These tools can be used to simulate and troubleshoot in any environment, and masquerade as existing devices. In this video, you will see how to use both tools, by observing the commands to send DICOM files from StoreSCU, which are received by StoreSCP. You will also see various options that allow for setting Called and Calling AE Titles, transfer syntax, and multiple files. I hope you find this video helpful, please leave any comments or questions below, and thanks for watching!
Views: 4961 Brian Green
Systems Analysis and Design: Databases and Controls (Part 12)
 
38:49
Most systems projects will require the use of databases for persistence. Up to this point, we have not discussed databases, but in most projects you will be required to build a database schema based on your design and the developed software. In this unit, we will discuss relational databases, how to build database schema to effectively support your system, and the various options for databases. We will also discuss security issues.
Views: 4433 Brian Green
Systems Development Lifecyle - An Introduction
 
19:57
This presentation is based on the content of Chapter One: Modern Systems Analysis and Design by Joseph Valacich. In this presentation, I discuss an introduction to the Systems Analysis and Design discipline. Various forms of the SDLC are discussed, as well as the techniques, tools and methodologies. In addition, the iterative nature of information systems design is stressed and explained.
Views: 1475 Brian Green
Systems Analysis and Design - Introduction to Project Management, Part 1
 
30:49
This video introduces the discipline of project management, and including the phases of project management as wells as tools and techniques such as Work Breakdown Structure (WBS), Network Diagrams, and GANTT charts. This video is based on content from Modern Systems Analysis and Design, 8th Ed, available fro Pearson
Views: 2697 Brian Green
IT Security II - General Cryptography Concepts
 
30:16
In this unit, you become acquainted with the principles of cryptography. The unit opens with the concepts of cryptography, including the description of vocabulary elements associated with general cryptography. An examination of the fundamental methods of cryptography, encryption, and hashing was presented in terms of the types of algorithms and the types of data. Data can be in either block form, where many bytes are present at a time for encryption, or in stream form, where bytes are spaced temporally. Encryption algorithms are either symmetric or asymmetric in nature. The issue of key exchange, a challenge in the case of symmetric encryption, is presented, including methods such as ephemeral Diffie-Hellman exchanges that offer perfect forward secrecy. Newer methods, including elliptic curve and quantum-based cryptography, are also covered. The unit presents the use of hash functions for verification of integrity. The combination of hash functions with asymmetric encryption enables things such as digital signatures and non-repudiation. The unit concludes with such topics as key escrow and stenography.
Views: 451 Brian Green
Systems Analysis and Design - Software Development Life Cycle (Part 11)
 
27:04
After a few gruelling units, we begin to slow down a little... in this unit we rewind a little, and discuss approaches to systems development. We already learned both structured and object oriented techniques (although we focused on object oriented), we compare these and other methods, and how they can be carried out in an over system design. Objectives: Compare the underlying assumptions and uses of a predictive and an adaptive system development life cycle (SDLC) Describe the key activities and tasks of information system support Explain what comprises a system development methodology—the SDLC as well as models, tools, and techniques Describe the two overall approaches used for software construction and modeling: the structured approach and the object-oriented approach Describe the key features of Agile development
Views: 8481 Brian Green
Systems Analysis and Design - Feasibility Analysis
 
28:48
Before analysis can begin, we must first evaluate various alternatives from which we can use to develop an information system, and perform an objective analysis to validate our decision. The objective analysis will include an economic, technical, organizational, political and other feasibility studies, which are described in this video. This presentation is based on content in Modern Systems Analysis and Design, 8th Ed, available from Pearson.
Views: 2259 Brian Green
Systems Analysis and Design - The Sources of Software
 
26:38
This presentation is based on the content of Chapter Two: Modern Systems Analysis and Design by Joseph Valacich. In this presentation, I discuss the various sources of software mentioned in the text. This includes outsourcing, the cloud, enterprise resource planning vendors such as SAP, open source, packaged software vendors, and in-house development.
Views: 780 Brian Green
Structured Anlysis Process Modeling (OO Systems Analysis Appendix A)
 
34:09
Although this course is focused on object oriented systems analysis and design, another technique that is frequently used is structured analysis and design. The Gane and Sarson techniques for data flow diagramming are just as useful for modeling and understanding systems, and in some cases may be even more appropriate than OO methods. You may also find that users and non-technical stakeholders can digest structured models a bit easier than UML models with their complicated syntax.
Views: 5227 Brian Green
Create an ERD in MS Visio (Lab 4.1)
 
18:58
In this lab, we create and normalize our database design using MS Visio.
Views: 4076 Brian Green
DICOM Communications 101
 
01:05:02
Intended for those supporting DICOM networks and applications. The video begins with a level-set on network protocols and standards upon which DICOM relies, with emphasis on concerns for DICOM. The first 44 minutes of the video is network topics, with the last 25 minutes focused on DICOM (if you already know TCP/IP, you can skip to 0:44). - TCP/IP - Data Link (IEEE 802.3 - MAC) - Network (Internet Protocol - IP) - IP Addresses - Packet Header - Routing - Transport (Transmission Control Protocol - TCP) - RFC 783 Overview - Segment Header - 3-Way Handshake - State Management - Basic Network Security & DICOM - Firewalls - State vs Stateful - Rules - Cisco vs *nix (IPTABLES) - Simple example for a secure DICOM network - DICOM - DICOM Association - DICOM C-Store - DICOM DIMSE-C Introduction - DICOMWeb Introduction - Discussion on TCP Performance Tuning (using John Nagle's algorithm as an example)
Views: 516 Brian Green
Systems Analysis and Design: Build, Test and Implement (Part 13)
 
26:39
In this final unit, we discuss issues with implementation of a system. After all the analysis and design, we need to implement the system--however, like everything else we have discussed thus far, there are some techniques and planning to do this. For example, we need to perform adequate testing, possibly migrate data, and implement in a way that will ensure user acceptance.
Views: 4327 Brian Green
OO Systems Analysis and Design - Use Case Realizations (Part 10)
 
35:04
In this unit we expand on object oriented approaches to design. We will apply OO design principals to architectural design, learn about design class diagrams, CRC cards, communications diagrams, and other OO techniques. Of course, all of this will rely on the OO techniques we employed in the analysis phase.
Views: 7710 Brian Green
Unix/Linux Directory Services
 
51:47
A brief overview of using NIS and/or LDAP for directory services in Linux or Unix. This video also contains a 30,000 foot view of some LDAP concepts that some students may find useful if new to LDAP.
Views: 661 Brian Green
Fix Yum in older Fedora Versions
 
07:52
If you are running an oldr version of Fedora, Yum will not work unless you change the repository.
Views: 159 Brian Green
DBServer Part1
 
30:49
Views: 117 Brian Green
IT Security Wireless & Application Attacks
 
01:09:00
In this video, we begin by exploring application and wireless attacks. The video opens with a discussion of wireless attacks, including rouge access points, jamming and interference, evil twin, Bluetooth attack (bluejacking, bluesnarfing, and bluebugging), and war chalking and war driving. We also cover attacks against encryption, including IV attacks, WEB/WPA attacks, and WPS attacks. For the Security+ exam, you will be expected to be able to explain these types of attacks. The next part of the video presents application attacks, beginning with cross-site scripting. Injection attacks follows, including SQL, LDAP, XML, and directory traversal/command injections. Overflow attacks, including buffer and integer, are presented. The category of zero-day attacks are defined. The video continues with cookies, malicious add-ons, and session hijacking. The Security+ exam expects you to be able to explain these types of application attacks.
Views: 469 Brian Green
Systems Analysis and Design - Initiating the Systems Development Lifecycle
 
10:10
Once a problem domain is identified, the systems development planning phase begins. This presentation is based on content in Modern Systems Analysis and Design, 8th Ed, available from Pearson.
Views: 373 Brian Green
Oracle SQL Programming - Group Functions
 
19:30
An explanation of group functions using Oracle SQL
Views: 50 Brian Green
Host Based Security Part I (7a)
 
33:23
In this unit, you become acquainted with the principles behind securing the host machine, including the data and applications that run on it. The unit opens with an examination of operating systems, how to harden them, and the standard security precautions of security software and patching practices. It next covers the topics associated with physical access, followed by a presentation of security applications of firewalls and intrusion detection as well as white listing of applications. Virtualizatin and its implications are also covered. The latter half of the unit covers the topic of data security, including encryption, policy, and the use of appropriate controls to ensure data security. You will learn about the use of hardware-specific devices, including TPM and HSMs, as well as how to manage data across the enterprise, from the cloud, to SAN, to removable media.
Views: 1877 Brian Green
Systems Analysis and Design - Baseline Project Plan
 
03:23
A description of the Baseline Project Plan, which is used to begin a systems development project, and justifies the initial decisions. This presentation is based on content in Modern Systems Analysis and Design, 8th Ed, available from Pearson.
Views: 390 Brian Green
Oracle Database Programming - Single Row Functions
 
41:01
An overview and examples of Single Row Functions using Oracle SQL
Views: 363 Brian Green
Using the Grade Center in Blackboard or Coursesites
 
04:42
This video is a brief tutorial for students using Blackboard / Coursesites. Many students ask me how to access the grade center, and see what assignments are completed/missing; this video will answer that question.
Views: 276 Brian Green
IT Security II Threat Vulnerability and Discovery
 
47:07
In this unit, you will became acquainted with threat and vulnerability discovery. The unit opens with an examination of various security tools and how to interpret their results. The tools covered include protocol analyzers, vulnerability scanners, honeypots and honeynets, port scanners, and banner grabbing. These tools provide a mechanism for assessing the security level of a system. The unit continues by examining risk calculation. The use of risk calculations and desgin of assessments--- including risk, threat, and vulnerability assessments--- can provide information that allows for the prioritization of security actions. The next section, on assessment techniques, covers baseline reporting, code review, determining the attack surface, architecture reviews, and design reviews as methods of performing assessments. The unit next discusses penetration testing and vulnerability scanning. It covered the steps of penetration testing, the process of vulnerability scanning, false-positive and false-negative conditions, and, finally, white-box, black-box, and gray-box testing.
Views: 418 Brian Green