Designing Security for Microsoft SQL Server 2005
Short course
In London
Description
-
Type
Short course
-
Location
London
This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft SQL ServerT 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements, network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.
Facilities
Location
Start date
Start date
Reviews
Course programme
Lessons
- Principles of Database Security
- Methodology for Designing aSQLServer Security Policy
- MonitoringSQLServer Security
- Explain the principles ofSQLServer security
- Describe the methodology to design aSQLServer security policy
- Explain the importance of monitoringSQLServer security
Lessons
- Integrating with Enterprise Authentication Systems
- Developing Windows Server-Level Security Policies
- Developing a Secure Communication Policy
- DefiningSQLServer Security Monitoring Standards
- Developing Microsoft Windows Server-Level Security Policies
- Developing a Secure Communication Policy
- IntegratingSQLServer Security Within the Active Directory Environment
- IntegratingSQLServer Security With Firewall Configurations
- Discussing Systems Infrastructure Security Integration
- Auditing theSQLServer Logins
- Auditing the Windows Local Password Policy
- AuditingSQLServer Service Accounts
- Monitoring Security at the Enterprise and Server Levels
- IntegrateSQLServer security with enterprise-level authentication systems
- Develop Windows server-level security policies
- Develop a secure communication policy
- Define security monitoring standards forSQLServer at the enterprise and server level
Lessons
- Designing an Instance-Level Security Policy
- Designing a Database-Level Security Policy
- Designing an Object-Level Security Policy
- Defining Security Monitoring Standards for Instances and Databases
- Designing an Instance-Level Security Policy
- Designing a Database-Level Security Policy
- Designing an Object-Level Security Policy
- Discussing Database Security Exceptions
- Auditing Existing Server Logins
- AuditingSQLServer Roles Membership
- Analyzing Existing Object Permissions
- Monitoring Security at the Instance and Database Level
- Design aSQLServer instance-level security policy
- Design a database-level security policy
- Design an object-level security policy
- Define security monitoring standards for instances and databases
Lessons
- Securing Data by Using Encryption and Certificates
- Designing Data Encryption Policies
- Determining a Key Storage Method
- Selecting a Data Security Method
- Designing a Data Encryption Security Policy
- Selecting a Key Storage Method
- Secure data by using encryption and certificates
- Design data encryption policies
- Determine a key storage method
Lessons
- Analyzing Business and Regulatory Requirements
- Determining the Exceptions and their Impact
- Identifying Variations from the Security Policy
- Obtaining Approval of the Security Policy
- Discussing the Results of Policy Approval Presentations
- Analyze business and regulatory requirements
- Determine the exceptions and their impact on security
Lessons
- Designing a Response Policy for Virus and Worm Attacks
- Designing a Response Policy for Denial-of-Service Attacks
- Designing a Response Policy for Internal andSQLInjection Attacks
- Designing a Response Policy for Virus and Worm Attacks
- Designing a Response Policy for Denial-of-Service Attacks
- Designing a Response Policy for Internal Attacks
- Validating a Security Policy
- Design a response policy for virus and worm attacks
- Design a response policy to handle the denial-of-service attacks
- Design a response policy to prevent internal andSQLinjection attacks
Designing Security for Microsoft SQL Server 2005