Description
Introduction
This two-hour course provides you with the skills and
knowledge required to manage security in SQL Server 2008. In this
course, you will explore the SQL Server 2008 security model. You
will also learn how to create SQL logins and database users and use
existing or new roles to facilitate security at a user level or
role level.
Topics covered in this course include:
- Overview of the SQL Server 2008 Security Model
- Securing SQL Server 2008
- Securing SQL Server Databases
- Using Data Encryption to Protect Data
- Auditing in SQL Server 2008
Student prerequisites:
To benefit from this course, the learner must be familiar with
using Microsoft Windows. They must have knowledge of basic…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction This two-hour course provides you with the skills and
knowledge required to manage security in SQL Server 2008. In this
course, you will explore the SQL Server 2008 security model. You
will also learn how to create SQL logins and database users and use
existing or new roles to facilitate security at a user level or
role level.
Topics covered in this course include:
- Overview of the SQL Server 2008 Security Model
- Securing SQL Server 2008
- Securing SQL Server Databases
- Using Data Encryption to Protect Data
- Auditing in SQL Server 2008
Student prerequisites:
To benefit from this course, the learner must be familiar with
using Microsoft Windows. They must have knowledge of basic
relational database concepts and querying data by using
Transact-SQL. They must be familiar with the role of a database
administrator.
Objectives At the end of the course, students will be able to:
- Describe the SQL Server 2008 security model.
- Secure SQL Server 2008.
- Secure SQL Server 2008 databases.
- Use data encryption to protect data.
- Audit security in SQL Server 2008.
Modules & Lessons Course Overview Module Overview Navigation
Overview Navigation Overview Course Information Course Information
Managing Security in Microsoft SQL Server 2008 Module Overview
Overview of the SQL Server 2008 Security Model Introduction SQL
Server 2008 Principals SQL Server 2008 Securables SQL Server 2008
Permissions Self Test Securing SQL Server 2008 Introduction SQL
Server 2008 Authentication Modes Creating SQL Server 2008 Logins
SQL Server 2008 Fixed Server Roles Creating SQL Server 2008
Credentials Setting Server-Scope Permissions Self Test Securing SQL
Server Databases Introduction Special Accounts in a Database
Creating Database Users Describing Database Roles Creating
User-Defined Database Roles Creating Application Roles Setting
Database Scope Permissions Setting Schema Scope Permissions Self
Test Using Data Encryption to Protect Data Introduction Creating
and Using Certificates and Keys SQL Server 2008 Cryptographic
Architecture Enabling a Database on TDE Using EKM Self Test
Auditing in SQL Server 2008 Introduction Auditing in SQL Server
2008 Setting Server Scope Audit Properties SQL Server Audit Using
SQL Server Audit Auditing with SQL Server Profiler Auditing by
Using DDL Triggers Self Test Best Practices Best Practices Lab:
Managing Security in Microsoft SQL Server 2008 Lab Overview
Scenario Exercise Information Launch the Lab Lab Review Module
Summary Module Summary Glossary Glossary System Requirements To
view this course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.