MOC 2787 Designing Security for Microsoft SQL Server 2005

amk-group
Inhouse

2.200 
zzgl. MwSt.
Möchten Sie den Bildungsanbieter lieber direkt anrufen?
030 -... Mehr ansehen
Vergleichen Sie diesen Kurs mit ähnlichen Kursen
Mehr ansehen

Wichtige informationen

  • Seminar
  • Anfänger
  • Inhouse
  • Dauer:
    2 Tage
Beschreibung

This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL ServerT 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also lea

Wichtige informationen

Was lernen Sie in diesem Kurs?

Microsoft

Themenkreis

Seminarziel

This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL ServerT 2005.

The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.

Zielgruppe

This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Inhalt:

Module 1: Introduction to Designing SQL Server Security

This module introduces the principles and methodology of designing SQL Server security. This module also explains the benefits of having a security policy in place and the process of creating a security policy. In addition, this module teaches you the importance of monitoring the security of SQL Server.

Module 2: Designing a SQL Server Systems Infrastructure Security Policy

This module provides the guidelines for implementing server-level security using authentication methods. This module also provides the knowledge required to develop a Microsoft Windows® server-level security policy. To enable you to do this, this module provides the guidelines to create password policy and determine service accounts permissions. In addition, this module explains how to select an appropriate encryption method to develop a secure communication policy. This module also explains the monitoring standards for SQL Server.

Module 3: Designing Security Policies for Instances and Databases

This module explains how to design SQL Server instance-level, database-level, and object-level security policies. This module teaches the security monitoring standards for instances and databases.

Module 4: Integrating Data Encryption into a Database Security Design

This module provides the guidelines and considerations for security data using encryption and certificates. This module also describes various data encryption policies. Finally, this module shows how to determine a key storage method.

Module 5: Designing a Security Exceptions Policy

This module provides guidelines for gathering business and regulatory requirements and comparing them with existing policy. This module also covers how to determine the exceptions and their impact on security.

Module 6: Designing a Response Strategy for Threats and Attacks

This module provides guidelines to respond to virus and worm attacks, denial-of-service attacks, and injection attacks.

Vorraussetzung:

Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos

Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for

Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc

Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs)

Be able to design a database to third normal form (3NF) and know the trade offs when backing out of the fully normalized design (denormalization) and designing for performance and business requirements in addition to being familiar with design models, such as Star and Snowflake schemas

Have strong monitoring and troubleshooting skills

Have experience creating Microsoft Visio® drawings or have equivalent knowledge

Have strong knowledge of the operating system and platform. That is, how the operating system integrates with the database, what the platform or operating system can do, interaction between the operating system and the database

Have basic knowledge of application architecture. That is, different methods of implementing security in an application, how applications can be designed in three layers, what applications can do, the interaction between applications and the database, and interactions between the database and the platform or operating system

Have knowledge about network security tools. For example, sniffer and port scanning. Must understand how they should be used

Be able to use patch management systems

Have knowledge of common attack methods. For example, buffer overflow, replay attacks, etc.

Be familiar with SQL Server 2005 features, tools, and technologies

Have a Microsoft® Certified Technology Specialist: Microsoft SQL Server 2005 credential or equivalent experience

Knowledge about Maintaining a Microsoft SQL Server 2005 Database

In addition, it is recommended, but not required, that students have completed:

  • Course 2778, Writing Queries Using Microsoft SQL Server 2005 Transact-SQL


  • Course 2779, Implementing a Microsoft SQL Server 2005 Database



Vergleichen Sie diesen Kurs mit ähnlichen Kursen
Mehr ansehen