New Horizons Lexington KY Computer Training
New Horizons Computer Learning Center presents
 

2787 Designing Security for Microsoft SQL Server 2005 On-Site Training

This on-site training class is also available as Public Schedule Seminar.

This course enables database administrators in enterprise environments to design security for database systems using Microsoft SQL ServerT 2005

Course Description/Agenda


This course enables database administrators in enterprise environments to design security for database systems using Microsoft SQL ServerT 2005. It covers business needs, regulatory requirements and network systems, and database design considerations.

Who Should Attend:
This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.


Prerequisite(s) or equivalent knowledge:
2780 Maintaining a Microsoft SQL Server 2005 Database
2779 Implementing a Microsoft SQL Server 2005 Database
2778 Writing Queries Using Microsoft SQL Server 2008 Transact-SQL
 
Outline:
Lesson 1: Introduction to Designing SQL Server Security
Principles of Database Security
Methodology for Designing a SQL Server Security Policy
Monitoring SQL Server Security
Lesson 2: Designing a SQL Server Systems Infrastructure Security Policy
Integrating with Enterprise Authentication Systems
Developing Windows Server-level Security Policies
Developing a Secure Communication Policy
Defining SQL Server Security Monitoring Standards
Lesson 3: Designing Security Policies for Instances and Databases
Designing an Instance-level Security Policy
Designing a Database-level Security Policy
Designing an Object-level Security Policy
Defining Security Monitoring Standards for Instances and Databases
Lesson 4: Integrating Data Encryption into a Database Security Design
Securing Data by Using Encryption and Certificates
Designing Data Encryption Policies
Determining a Key Storage Method
Lesson 5: Designing a Security Exceptions Policy
Analyzing Business and Regulatory Requirements
Determining the Exceptions and their Impact
Lesson 6: Designing a Response Strategy for Threats and Attacks
Designing a Response Policy for Virus and Worm Attacks
Designing a Response Policy for Denial-of-Service Attacks
Designing a Response Policy for Internal and SQL Injection Attacks

 

More Seminar Information

New Horizons Computer Learning Center
New Horizons Lexington KY Computer Training

Delivery Method

On-Site Training On-Site Training

Also Available As

Seminar Seminar

 
Add to favorites Add to favorites
Email Email this page
 

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.

Name:

Email

Phone:

City and State

Company:

Number of students:
(at least 10 for consideration)

When do you want to hold the
seminar?

How long would you like for the
seminar?

Additional comments to trainer:

We value your privacy!