Skip to content

2787 Designing Security for Microsoft SQL Server 2005


Infero Training Ltd

Summary

Price
£763.20 inc VAT
Or £63.60/mo. for 12 months...
Study method
Classroom
Duration
2 days · Part-time
Qualification
No formal qualification
Additional info
  • Tutor is available to students

Location & dates

Location
Address
Station St
New Street Station Forecourt
BIRMINGHAM
West Midlands
B24ND
United Kingdom
Address
Friary
Friary
BRISTOL
Avon
BS16EA
United Kingdom
Address
The Space Centre
Judd Street
CENTRAL LONDON
LONDON
WC1H9NT
United Kingdom
Address
Parkside
Parkside
COVENTRY
West Midlands
CV12HG
United Kingdom

Overview

Module 1: Introduction to Designing SQL Server Security

• Principles of Database Security
• Methodology for Designing a SQL Server Security Policy
• Monitoring SQL Server Security

Module 2: Designing a SQL Server Systems Infrastructure Security Policy

• Integrating with Enterprise Authentication Systems
• Developing Windows Server-Level Security Policies
• Developing a Secure Communication Policy
• Defining SQL Server Security Monitoring Standards
Lab : Designing a SQL Server Systems Infrastructure Security Policy
• Developing Microsoft Windows Server-Level Security Policies
• Developing a Secure Communication Policy
• Integrating SQL Server Security Within the Active Directory Environment
• Integrating SQL Server Security With Firewall Configurations
• Discussing Systems Infrastructure Security Integration
Lab : Creating an Infrastructure Security Inventory
• Auditing the SQL Server Logins
• Auditing the Windows Local Password Policy
• Auditing SQL Server Service Accounts
• Monitoring Security at the Enterprise and Server Levels

Module 3: Designing Security Policies for Instances and Databases

• Designing an Instance-Level Security Policy
• Designing a Database-Level Security Policy
• Designing an Object-Level Security Policy
• Defining Security Monitoring Standards for Instances and Databases
Lab : Designing Security Policies for Instances and Databases
• Designing an Instance-Level Security Policy
• Designing a Database-Level Security Policy
• Designing an Object-Level Security Policy
• Discussing Database Security Exceptions
Lab : Validating Security Policies for Instances and Databases
• Auditing Existing Server Logins
• Auditing SQL Server Roles Membership
• Analyzing Existing Object Permissions
• Monitoring Security at the Instance and Database Level

Module 4: Integrating Data Encryption into a Database Security Design

• Securing Data by Using Encryption and Certificates
• Designing Data Encryption Policies
• Determining a Key Storage Method
Lab : Integrating Data Encryption into a Database Security Design
• Selecting a Data Security Method
• Designing a Data Encryption Security Policy
• Selecting a Key Storage Method

Module 5: Designing a Security Exceptions Policy

• Analyzing Business and Regulatory Requirements
• Determining the Exceptions and their Impact
Lab : Designing a Security Exceptions Policy
• Identifying Variations from the Security Policy
• Obtaining Approval of the Security Policy
• Discussing the Results of Policy Approval Presentations

Module 6: Designing a Response Strategy for Threats and Attacks

• Designing a Response Policy for Virus and Worm Attacks
• Designing a Response Policy for Denial-of-Service Attacks
• Designing a Response Policy for Internal and SQL Injection Attacks
Lab : Designing a Response Strategy for Threats and Attacks
• Designing a Response Policy for Virus and Worm Attacks
• Designing a Response Policy for Denial-of-Service Attacks
• Designing a Response Policy for Internal Attacks
• Validating a Security Policy

Description

This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft SQL ServerT 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements, network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats

Who is this course for?

This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Requirements

• Have basic knowledge of security protocols and how they work. For example, Windows NT LAN Manager (NTLM) or Kerberos.
• Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for.
• Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in a networking context, and common vulnerability points.
• Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs).

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.