M2787: Designing Security for Microsoft SQL Server 2005

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course M2787: Designing Security for Microsoft SQL Server 2005 at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
2 Days
Location type:
Open

completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Before attending this course, students must:

- Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos.
- Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for.
- Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc.
- Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs).
- Be able to design a database to thi…

Read the complete description

Description

Prerequisites:

Before attending this course, students must:

- Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos.
- Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for.
- Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc.
- Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs).
- Be able to design a database to third normal form (3NF) and know the trade offs when backing out of the fully normalized design (denormalization) and designing for performance and business requirements in addition to being familiar with design models, such as Star and Snowflake schemas.
- Have strong monitoring and troubleshooting skills.
- Have experience creating Microsoft Visio drawings or have equivalent knowledge.
- Have strong knowledge of the operating system and platform. That is, how the operating system integrates with the database, what the platform or operating system can do, interaction between the operating system and the database.
- Have basic knowledge of application architecture. That is, different methods of implementing security in an application, how applications can be designed in three layers, what applications can do, the interaction between applications and the database, and interactions between the database and the platform or operating system.
- Have knowledge about network security tools. For example, sniffer and port scanning. Must understand how they should be used.
- Be able to use patch management systems.
- Have knowledge of common attack methods. For example, buffer overflow, replay attacks, etc.
- Be familiar with SQL Server 2005 features, tools, and technologies.
- Have a Microsoft Certified Technology Specialist: Microsoft SQL Server 2005 credential or equivalent experience.
- In addition, it is recommended, but not required, that students have completed:
- Course 2779, Implementing a Microsoft SQL Server 2005 Database.
- Course 2780, Maintaining a Microsoft SQL Server 2005 Database.

Course Description:

This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL ServerT 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.

This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Elements of this syllabus are subject to change.

This course includes the following modules:

Introduction to Designing SQL Server Security

  • Principles of Database Security
  • Methodology for Designing a SQL Server Security Policy
  • Monitoring SQL Server Security

Designing a SQL Server Systems Infrastructure Security Policy

  • Integrating with Enterprise Authentication Systems
  • Developing Windows Server-level Security Policies
  • Developing a Secure Communication Policy
  • Defining SQL Server Security Monitoring Standards

Designing Security Policies for Instances and Databases

  • Designing an Instance-level Security Policy
  • Designing a Database-level Security Policy
  • Designing an Object-level Security Policy
  • Defining Security Monitoring Standards for Instances and Databases

Integrating Data Encryption into a Database Security Design

  • Securing Data by Using Encryption and Certificates
  • Designing Data Encryption Policies
  • Determining a Key Storage Method

Designing a Security Exceptions Policy

  • Analyzing Business and Regulatory Requirements
  • Determining the Exceptions and their Impact

Designing a Response Strategy for Threats and Attacks

  • Designing a Response Policy for Virus and Worm Attacks
  • Designing a Response Policy for Denial-of-Service Attacks
  • Designing a Response Policy for Internal and SQL Injection Attacks

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

In-company offer

Ask for a quote on a customised training course.
Maximum 3 relevant providers will directly respond.

More courses within this subject:

Compare 36,074 training courses in subjects like Microsoft Visio

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans