Designing Security for Microsoft SQL Server 2005



Similar documents
Preliminary Course Syllabus

Designing a Microsoft SQL Server 2005 Infrastructure

Designing Database Solutions for Microsoft SQL Server 2012

MS 20465: Designing Database Solutions for Microsoft SQL Server 2012

MS-55096: Securing Data on Microsoft SQL Server 2012

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Securing Data on Microsoft SQL Server 2012

Administering Microsoft SQL Server 2014 Databases

Course Outline:

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases

Course 20462C: Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases

ADMINISTERING MICROSOFT SQL SERVER DATABASES

SQL Server 2014

Administering Microsoft SQL Server Databases

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Administering Microsoft SQL Server Databases 20462C; 5 days

Administering Microsoft SQL Server Databases

Microsoft Administering Microsoft SQL Server Databases

Course: Administering Microsoft SQL Server Databases Overview

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

Administering a Microsoft SQL Server 2000 Database

MS Designing and Optimizing Database Solutions with Microsoft SQL Server 2008

Administering Microsoft SQL Server Databases

20462C: Administering Microsoft SQL Server Databases

Administering a SQL Database Infrastructure 20764; 5 Days; Instructor-led

Administering a SQL Database Infrastructure

Course 20462: Administering Microsoft SQL Server Databases

MS Administering Microsoft SQL Server Databases

Microsoft SQL Server 2014: MS SQL Server Administering Databases

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training

Administering a SQL Database Infrastructure (MS )

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack B; 5 days, Instructor-led

Table of Contents. Introduction. Audience. At Course Completion

M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

Administering Microsoft Dynamics CRM 2011 Course 80446; 2 Days, Instructor-led

Implementing a Data Warehouse with Microsoft SQL Server 2012 (70-463)

Table of Contents. Introduction. Audience. At Course Completion

20462 Administering Microsoft SQL Server Databases

Microsoft. Course 20463C: Implementing a Data Warehouse with Microsoft SQL Server

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Administering Microsoft SQL Server 2012 Databases

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

MS 20467: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

Administering Microsoft SQL Server Databases

6419: Configuring, Managing, and Maintaining Server 2008

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Microsoft Dynamics CRM 2011 Installation and Deployment

Microsoft Administering a SQL Database Infrastructure

Designing and Implementing a Server Infrastructure

ExecuTrain Course Outline MOC 6231B: Maintaining a Microsoft SQL Server 2008 R2 Database

Intelligent Data Management Framework in Microsoft Dynamics AX 2012

6231A - Maintaining a Microsoft SQL Server 2008 Database

Implementing Microsoft Azure Infrastructure Solutions

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Directory and File Transfer Services. Chapter 7

Course Administering Windows Server About this Course. Level: 200 Technology: Windows Server 2012

Implementing a Microsoft SQL Server 2005 Database

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases

MOC Administering Microsoft SQL Server 2014 Databases

A Systems Engineering Approach to Developing Cyber Security Professionals

Configuring, Managing and Maintaining Windows Server 2008 Servers

eeye Digital Security Product Training

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

Below are the some of the new features of SQL Server that has been discussed in this course

Administering Windows Server 2012

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers

CISCO IOS NETWORK SECURITY (IINS)

Implementing a Microsoft SQL Server 2008 Database

Microsoft Maintaining a Microsoft SQL Server 2008 Database

Course 6232A: Implementing a Microsoft SQL Server 2008 Database

Configuring, Managing and Maintaining Windows Server 2008 Servers

Implementing a Data Warehouse with Microsoft SQL Server 2012

NE-20411D Administering Windows Server 2012

Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012

Administering Windows Server 2012

Administering Windows Server 2012

Course: Fundamentals of Microsoft Server 2008 Active Directory

Administering the Web Server (IIS) Role of Windows Server

Administering Microsoft SQL Server Databases MOC 20462

Administering Microsoft Exchange Server ; 5 Days, Instructor-led

Administering Microsoft SQL Server 2012 Databases

Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course 20467A; 5 Days

Fundamentals of a Windows Server Infrastructure MOC 10967

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

10775 Administering Microsoft SQL Server Databases

Administering Windows Server 2012

MOC 20462C: Administering Microsoft SQL Server Databases

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

MS-10775: Administering Microsoft SQL Server 2012 Databases. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Transcription:

Designing Security for Microsoft SQL Server 2005 Course 2787 Two Days Hands-On, Instructor-Led Introduction This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft SQL Server 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats. Audience This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment. Prerequisites Before attending this course, students should: Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos. Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for. Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc. Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs). Be able to design a database to third normal form (3NF) and know the trade offs when backing out of the fully normalized design (denormalization) and designing for performance and business requirements in addition to being familiar with design models, such as Star and Snowflake schemas. Have strong monitoring and troubleshooting skills. Have experience creating Microsoft Visio drawings or have equivalent knowledge. Have strong knowledge of the operating system and platform. That is, how the operating system integrates with the database, what the platform or operating system can do, interaction between the operating system and the database. Have basic knowledge of application architecture. That is, different methods of implementing security in an application, how applications can be designed in three layers, what applications can do, the interaction between applications

and the database, and interactions between the database and the platform or operating system. Have knowledge about network security tools. For example, sniffer and port scanning. Must understand how they should be used. Be able to use patch management systems. Have knowledge of common attack methods. For example, buffer overflow, replay attacks, etc. Be familiar with SQL Server 2005 features, tools, and technologies. Information on the topics above can be obtained by attending some of the following courses: Course 2778, Writing Queries Using Microsoft SQL Server 2005 Transact-SQL Course 2779, Implementing a Microsoft SQL Server 2005 Database Course 2780, Maintaining a Microsoft SQL Server 2005 Database Ways to Save ISInc Training Tickets Government GSA, CMAS Contracts Save with six or more students in the same class. A dedicated training course, at your location or ours, can save you even more. Course Outline Module 1: Introduction to Designing SQL Server Security This module introduces the principles and methodology of designing SQL Server security. This module also explains the benefits of having a security policy in place and the process of creating a security policy. In addition, this module teaches you the importance of monitoring the security of SQL Server. Principles of Database Security Methodology for Designing a SQL Server Security Policy Monitoring SQL Server Security Explain the principles of SQL Server security. Describe the methodology to design a SQL Server security policy Explain the importance of monitoring SQL Server security Module 2: Designing a SQL Server Systems Infrastructure Security Policy This module provides the guidelines for implementing server-level security using authentication methods. This module also provides the knowledge required to develop a Microsoft Windows server-level security policy. To enable you to do this, this module provides the guidelines to create password policy and determine service accounts permissions. In addition, this module explains how to select an appropriate

encryption method to develop a secure communication policy. This module also explains the monitoring standards for SQL Server. Integrating with Enterprise Authentication Systems Developing Windows Server-level Security Policies Developing a Secure Communication Policy Defining SQL Server Security Monitoring Standards Lab 2A: Designing a SQL Server Systems Infrastructure Security Policy Developing Microsoft Windows Server-level Security Policies Developing a Secure Communication Policy Integrating SQL Server Security Within the Active Directory Environment Integrating SQL Server Security With Firewall Configurations Discussing Systems Infrastructure Security Integration Lab 2B: Creating an Infrastructure Security Inventory Auditing the SQL Server Logins Auditing the Windows Local Password Policy Auditing SQL Server Service Accounts Monitoring Security at the Enterprise and Server Levels Integrate SQL Server security with enterprise-level authentication systems. Develop Windows server-level security policies. Develop a secure communication policy. Define security monitoring standards for SQL Server at the enterprise and server level. Module 3: Designing Security Policies for Instances and Databases This module explains how to design SQL Server instance-level, database-level, and object-level security policies. This module teaches the security monitoring standards for instances and databases. Designing an Instance-level Security Policy Designing a Database-level Security Policy Designing an Object-level Security Policy Defining Security Monitoring Standards for Instances and Databases Lab 3A: Designing Security Policies for Instances and Databases Designing an Instance-level Security Policy Designing a Database-level Security Policy Designing an Object-level Security Policy Discussing Database Security Exceptions

Lab 3B: Validating Security Policies for Instances and Databases Auditing Existing Server Logins Auditing SQL Server Roles Membership Analyzing Existing Object Permissions Monitoring Security at the Instance and Database Level Design a SQL Server instance-level security policy Design a database-level security policy Design an object-level security policy Define security monitoring standards for instances and databases Module 4: Integrating Data Encryption into a Database Security Design This module provides the guidelines and considerations for security data using encryption and certificates. This module also describes various data encryption policies. Finally, this module shows how to determine a key storage method. Securing Data by Using Encryption and Certificates Designing Data Encryption Policies Determining a Key Storage Method Lab 4: Integrating Data Encryption into a Database Security Design Selecting a Data Security Method Designing a Data Encryption Security Policy Selecting a Key Storage Method Secure data by using encryption and certificates Design data encryption policies Determine a key storage method Module 5: Designing a Security Exceptions Policy This module provides guidelines for gathering business and regulatory requirements and comparing them with existing policy. This module also covers how to determine the exceptions and their impact on security. Analyzing Business and Regulatory Requirements Determining the Exceptions and their Impact Lab 5: Designing a Security Exceptions Policy Identifying Variations from the Security Policy

Obtaining Approval of the Security Policy Discussing the Results of Policy Approval Presentations Analyze business and regulatory requirements. Determine the exceptions and their impact on security Module 6: Designing a Response Strategy for Threats and Attacks This module provides guidelines to respond to virus and worm attacks, denial-ofservice attacks, and injection attacks. Designing a Response Policy for Virus and Worm Attacks Designing a Response Policy for Denial-of-Service Attacks Designing a Response Policy for Internal and SQL Injection Attacks Lab 6: Designing a Response Strategy for Threats and Attacks Designing a Response Policy for Virus and Worm Attacks Designing a Response Policy for Denial-of-Service Attacks Designing a Response Policy for Internal Attacks Validating a Security Policy Design a response policy for virus and worm attacks. Design a response policy to handle the denial-of-service attacks Design a response policy to prevent internal and SQL injection attacks