Securing Data on Microsoft SQL Server 2012



Similar documents
MS-55096: Securing Data on Microsoft SQL Server 2012

Designing Security for Microsoft SQL Server 2005

Preliminary Course Syllabus

Computer Visions Course Outline

50238: Introduction to SQL Server 2008 Administration

Implementing a Microsoft SQL Server 2005 Database

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

D50323GC20 Oracle Database 11g: Security Release 2

Table of Contents. Introduction. Audience. At Course Completion

Microsoft SQL Server Security Best Practices

Oracle Database 11g: Security Release 2

6231A - Maintaining a Microsoft SQL Server 2008 Database

Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills

Developing Secure Web Applications

MySQL Security: Best Practices

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Module 1: e- Learning

SQL Server for Database Administrators Course Syllabus

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

Deployment Scenarios

COURSE SYLLABUS COURSE TITLE:

Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led

Oracle Database 11g: Security. What you will learn:

ClockWork Enterprise 5

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

MS Administering Microsoft SQL Server Databases

Database Security SQL Server 2012

Author: Ryan J Adams. Overview. Policy Based Management. Terminology

Table of Contents. Introduction. Audience. At Course Completion

Below are the some of the new features of SQL Server that has been discussed in this course

Setup and configuration for Intelicode. SQL Server Express

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

QUANTIFY INSTALLATION GUIDE

Administering a SQL Database Infrastructure

Administering a SQL Database Infrastructure 20764; 5 Days; Instructor-led

SQL Server 2014

MCTS Microsoft SQL Server 2005 Implementation & Maintenance

Administering Microsoft SQL Server Databases

6231B: Maintaining a Microsoft SQL Server 2008 R2 Database

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

Oracle Database 11g: Security

Administering Microsoft SQL Server 2012 Databases

Administering a SQL Database Infrastructure (MS )

SQL Server 2008 Administration

JVA-122. Secure Java Web Development

Immotec Systems, Inc. SQL Server 2005 Installation Document

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Training module 2 Installing VMware View

How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql

10775A Administering Microsoft SQL Server 2012 Databases

Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Updating Your Microsoft SQL Server 2005 Skills to SQL Server 2008

Administering Microsoft SQL Server Databases MOC 20462

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Implementing Cisco IOS Network Security v2.0 (IINS)

Executive Summary and Purpose

Administering Microsoft SQL Server Databases

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

Administering Microsoft SQL Server Databases

Designing Database Solutions for Microsoft SQL Server 2012

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Implementing Cisco IOS Network Security

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

IT Networking and Security

MODULE FRAMEWORK : Dip: Information Technology Network Integration Specialist (ITNIS) (Articulate to Edexcel: Adv. Dip Network Information Specialist)

Implementing Microsoft SQL Server 2008 Exercise Guide. Database by Design

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Administering Microsoft SQL Server 2012 Databases

White Paper How Noah Mobile uses Microsoft Azure Core Services

Chapter 17. Transport-Level Security

Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam

Installation procedure for Chromis REC for 3CX

Ursuline College Accelerated Program URSULINE COLLEGE

CipherShare Features and Benefits

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Database security issues PETRA BILIĆ ALEXANDER SPARBER

Administering Microsoft SQL Server 2012 Databases

SQL Server 2012/2014 AlwaysOn Availability Group

FORBIDDEN - Ethical Hacking Workshop Duration

Administering Microsoft SQL Server Databases

Microsoft Administering a SQL Database Infrastructure

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Introduction to Cyber Security / Information Security

Beginning SQL Server Administration. Apress. Rob Walters Grant Fritchey

Cornerstones of Security

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

90% of data breaches are caused by software vulnerabilities.

SQL Server Hardening

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

EC-Council E C S P.NET. EC-Council. EC-Council Certified Secure Programmer (.NET)

Microsoft SQL Server 2014: MS SQL Server Administering Databases

Transcription:

Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to secure database servers. Module 1: Security and Privacy Concepts in SQL Server This module provides the background knowledge of security and privacy concepts in SQL server. presented in this module will provide an overview of SQL Server 2012 security and privacy. You will also learn the basics of auditing/monitoring users and how to use the built-in SQL Server tools. Overview of Security What is Security? Threat Modeling SQL Server Security Mode. Levels of Security in SQL Server Overview of Privacy What is Privacy? Balance between Privacy and Security SQL Server and Data Privacy Monitoring User Activity Auditing Basics Access Controls CSI SQL Server Using SQL Server Tools Microsoft Course 55096 Page 1 of 8 www.devore.com

Overview of SQL Tools SQL Server Configuration Manager (SSCM) SQL Server Management Studio (SSMS) Lab 1: None None Understand the basic concepts of security and privacy on SQL Server. Know the difference between security and privacy. Understand the need for data auditing. Recognize the correct tools for achieving all security tasks. Module 2: Security During and After Installation This module describes the security steps during and after installing SQL Server 2012. presented in this module will detail the security and service accounts during the installation. You will learn about the SQL Server Configuration Manager and working with Windows Firewall. You will also understand the password issues and policies for consumers of SQL resources. Security Steps during Installation Service Accounts Types of Authentication Administrator Account Security Steps after Installation Managing Services Using SSCM Managing Server Network Protocols using SSCM Managing Client Network Protocols using SSCM Working with Windows Firewall Connecting to a SQL Server Instance SQL Server Resources Consumers Types of SQL Server Consumers Password Issues Password Policy Microsoft Course 55096 Page 2 of 8 www.devore.com

Lab 1: Configuring Access to SQL Server Configuring TCP Port Opening TCP port 1433 on Windows Firewall Lab 2: Configuring Password Policy Configuring Password Policy through SSMS Configuring Password Policy through T-SQL Code Testing the Password Policy Understand what are the service accounts. Determine types of authentication. Understand the risk of administrator accounts. Module 3: Authentication and Authorization This module describes how to the authentication and authorization process in SQL Server works. presented in this module will detail how to authenticate and authorize users to access and use SQL data. You will also learn about server-side and database security. Authentication Process of Authentication Windows Authentication SQL Server Authentication Database Authentication Authorization Process of Authorization Mapping Login to User Default Database Users Accessing SQL Server Resources Server-Side Security Database Security Schema Separation Microsoft Course 55096 Page 3 of 8 www.devore.com

Lab 1: Authenticating Users Creating a New Windows Login Creating a New Contained Database Lab 2: Authorizing Users Creating New Database Users Lab 3: Applying Security Policy Applying Server-Side Policy Applying Database Access Policy Understand how to use the authentication process. Understand and use the authorization process. Access SQL Server resources. Module 4: Protecting Data This module describes how to protect your data in SQL Server 2012. presented in this module will detail how cryptography works and the crypto features in SQL Server 2012. You will learn about security keys and how they various methods of data encryption used, such as TDE, Symmetric and Asymmetric encryption. You will also learn the difference between hashing and encryption Understanding Cryptography What is Cryptography? Types of Cryptography SQL Server Cryptographic Features Keys What is a Key? Service Master Key Database Master Key Database Encryption Keys Microsoft Course 55096 Page 4 of 8 www.devore.com

Transparent Data Encryption (TDE) What is Transparent Data Encryption? Transparent Data Encryption Architecture Implementing Transparent Data Encryption Symmetric Encryption Symmetric Encryption Model Creating Symmetric Keys Implementing Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Model Creating Asymmetric Keys Implementing Asymmetric Encryption Hashing What is Hashing? Hashing vs. Encryption Implementing SQL Server Hash Functions Lab 1: Creating a Database Master Key Creating a New Database Master Key Lab 2: Implementing Transparent Data Encryption Implementing Transparent Data Encryption Lab 3: Implementing Symmetric Encryption Implementing Symmetric Encryption Lab 4: Implementing Asymmetric Encryption Implementing Asymmetric Encryption Lab 5: Implementing SQL Server Hash Functions Implementing Hash Functions Microsoft Course 55096 Page 5 of 8 www.devore.com

Understand what is cryptography. Know what cryptographic elements are. Defining cryptography in SQL Server. Recognize and use correct cryptographic SQL Server mechanisms. Module 5: Auditing on SQL Server This module describes the auditing process and how to use the various methods. presented in this module will detail the classic auditing methods, such as using triggers. You will learn how to configure SQL Server auditing and how to access the audit logs. You will also learn about database forensics and collecting digital evidence. Classic Audit Methods DDL Triggers DML Triggers SQL Server Profiler SQL Server Auditing SQL Server Audit Components Configuring SQL Server Audit Accessing SQL Server Audit Logs Database Forensics Digital Evidence Methods for Collecting Data Securing Digital Evidence Lab 1: Audit User Activity Implementing DML Trigger Lab 2: Auditing Server and Database Activity Implementing Server-Side Auditing Configuring Server-Side Auditing Lab 3: Securing Digital Evidence Implementing Server-Side Auditing Microsoft Course 55096 Page 6 of 8 www.devore.com

Tampering Evidence Implement classic auditing on SQL Server. Implement a new Audit feature in SQL Server 2012. Understand the basics about database forensics. Module 6: SQL Server Security Threats and Countermeasures This module describes the security threats and the countermeasures used to protect your data and database server. presented in this module will detail the weak points inside and outside of SQL Server 2012. You will also learn how to identify specific threats, such as data transfer sniffing and SQL code injection and how to prevent them with the appropriate countermeasures. Threats from Authorized Users User s Role in Date Security and Privacy Examples of Threats Countermeasures Physically Stealing Data Weak Points Inside SQL Server Weak Points Outside of SQL Server Countermeasures Data Transfer Sniffing Client/Server Communications Why is a Firewall not Enough? Countermeasures SQL Injection What is SQL Injections? Demonstration of SQL Injection Countermeasures Lab 1: Limiting Threats from an Authorized User Implementing Explicit DENY Microsoft Course 55096 Page 7 of 8 www.devore.com

Lab 2: Protecting Database Back-Up Implementing Transparent Data Encryption Lab 3: Protecting SQL Injection How to Protect SQL Injection on a User Table Identify threats from authorized users. Understand the risk from physically stealing data. Prevent data transfer sniffing. Avoid SQL injection. Microsoft Course 55096 Page 8 of 8 www.devore.com