Course 10155: Managing Security in Microsoft SQL Server 2008

Product type
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction This two-hour course provides you with the skills and knowledge required to manage security in SQL Server 2008. In this course, you will explore the SQL Server 2008 security model. You will also learn how to create SQL logins and database users and use existing or new roles to facilitate security at a user level or role level.

Topics covered in this course include:

  • Overview of the SQL Server 2008 Security Model
  • Securing SQL Server 2008
  • Securing SQL Server Databases
  • Using Data Encryption to Protect Data
  • Auditing in SQL Server 2008


Student prerequisites:

To benefit from this course, the learner must be familiar with using Microsoft Windows. They must have knowledge of basic…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Introduction This two-hour course provides you with the skills and knowledge required to manage security in SQL Server 2008. In this course, you will explore the SQL Server 2008 security model. You will also learn how to create SQL logins and database users and use existing or new roles to facilitate security at a user level or role level.

Topics covered in this course include:

  • Overview of the SQL Server 2008 Security Model
  • Securing SQL Server 2008
  • Securing SQL Server Databases
  • Using Data Encryption to Protect Data
  • Auditing in SQL Server 2008


Student prerequisites:

To benefit from this course, the learner must be familiar with using Microsoft Windows. They must have knowledge of basic relational database concepts and querying data by using Transact-SQL. They must be familiar with the role of a database administrator.
Objectives At the end of the course, students will be able to:
  • Describe the SQL Server 2008 security model.
  • Secure SQL Server 2008.
  • Secure SQL Server 2008 databases.
  • Use data encryption to protect data.
  • Audit security in SQL Server 2008.
Modules & Lessons Course Overview Module Overview Navigation Overview Navigation Overview Course Information Course Information Managing Security in Microsoft SQL Server 2008 Module Overview Overview of the SQL Server 2008 Security Model Introduction SQL Server 2008 Principals SQL Server 2008 Securables SQL Server 2008 Permissions Self Test Securing SQL Server 2008 Introduction SQL Server 2008 Authentication Modes Creating SQL Server 2008 Logins SQL Server 2008 Fixed Server Roles Creating SQL Server 2008 Credentials Setting Server-Scope Permissions Self Test Securing SQL Server Databases Introduction Special Accounts in a Database Creating Database Users Describing Database Roles Creating User-Defined Database Roles Creating Application Roles Setting Database Scope Permissions Setting Schema Scope Permissions Self Test Using Data Encryption to Protect Data Introduction Creating and Using Certificates and Keys SQL Server 2008 Cryptographic Architecture Enabling a Database on TDE Using EKM Self Test Auditing in SQL Server 2008 Introduction Auditing in SQL Server 2008 Setting Server Scope Audit Properties SQL Server Audit Using SQL Server Audit Auditing with SQL Server Profiler Auditing by Using DDL Triggers Self Test Best Practices Best Practices Lab: Managing Security in Microsoft SQL Server 2008 Lab Overview Scenario Exercise Information Launch the Lab Lab Review Module Summary Module Summary Glossary Glossary System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.