This instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL ServerT 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.

Target Audience

This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Objectives

  • Introduction to Designing SQL Server Security
  • Designing a SQL Server Systems Infrastructure Security Policy
  • Designing Security Policies for Instances and Databases
  • Integrating Data Encryption into a Database Security Design
  • Designing a Security Exceptions Policy
  • Designing a Response Strategy for Threats and Attacks

Course Outline

  • Introduction to Designing SQL Server Security
  • Principles of Database Security
  • Methodology for Designing a SQL Server Security Policy
  • Monitoring SQL Server Security
  • Designing a SQL Server Systems Infrastructure Security Policy
  • Integrating with Enterprise Authentication Systems
  • Developing Windows Server-level Security Policies
  • Developing a Secure Communication Policy
  • Defining SQL Server Security Monitoring Standards
  • Designing Security Policies for Instances and Databases
  • Designing an Instance-level Security Policy
  • Designing a Database-level Security Policy
  • Designing an Object-level Security Policy
  • Defining Security Monitoring Standards for Instances and Databases
  • Integrating Data Encryption into a Database Security Design
  • Securing Data by Using Encryption and Certificates
  • Designing Data Encryption Policies
  • Determining a Key Storage Method
  • Designing a Security Exceptions Policy
  • Analyzing Business and Regulatory Requirements
  • Determining the Exceptions and their Impact
  • Designing a Response Strategy for Threats and Attacks
  • Designing a Response Policy for Virus and Worm Attacks
  • Designing a Response Policy for Denial-of-Service Attacks
  • Designing a Response Policy for Internal and SQL Injection Attacks

EquiTrain –a pision of Equinox International- equips organizations with IT skills that are the lifeblood of modern corporate life, as Theyll as the professional expertise required for ensuring productivity and to remain competitive now and tomorrow.

At EquiTrain, They tailor end-to-end training solutions that incorporate both IT and business consultancy to the specific needs of each inpidual customer. They can equip yTheir IT professionals with all they need to quickly maximize yTheir new technology investments as Theyll as pushing forward absolute beginners on their road to IT proficiency.

They offer a broad range of IT and Management training cTheirses and certifications from top technology vendors with a choice of on-site or offsite, public or closed and local or abroad training. Their portfolio of cTheirses is supplemented by Their strategic training alliance with world's leading providers of learning solutions.

See all Equitrain courses

Contact information not available.

Courses you can instantly connect with...
Cisco Certified Network Associate - CCNA American Academy Mastering PHP & MySQL Helper Learning Cisco Certified Network Associate (CCNA) Helper Learning

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?

or