Description
Introduction
In this 2 hour course you will learn how to plan for security
during the design phase including designing a security strategy for
the various components of a SQL Server 2005 solution. You will also
learn how to choose an authentication and authorization strategy,
design security for various solution components, design objects,
and create an auditing strategy for your solution.
This course will also help prepare you for certification exam
70-441.
Objectives
At the end of the course, students
will be able to:
- Design a security strategy for the components of a SQL Server
2005 solution.
- Design objects to manage application access
- Create an auditing strategy
- Manage multiple develop…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this 2 hour course you will learn how to plan for
security during the design phase including designing a security
strategy for the various components of a SQL Server 2005 solution.
You will also learn how to choose an authentication and
authorization strategy, design security for various solution
components, design objects, and create an auditing strategy for
your solution.
This course will also help prepare you for certification exam
70-441.
Objectives At the end of the course, students will be able to:
- Design a security strategy for the components of a SQL Server
2005 solution.
- Design objects to manage application access
- Create an auditing strategy
- Manage multiple development teams by using the SQL Server 2005
security features.
Modules & Lessons Course Overview Module Introduction
Navigation Overview Lab Information Designing a Server-Side
Solution for SQL Server 2005 Designing a Security Strategy Module
Introduction Designing a Security Strategy for the Components of a
Solution Lesson Introduction Considerations for Choosing
Authentication Modes The Process for Defining an Authorization
Strategy Guidelines for Designing Security for Reporting Services
Guidelines for Designing Security for Notification Services
Considerations for Designing Security for Integration Services
Considerations for Designing Security for Replication Self Test
Designing Objects to Manage Application Access Lesson Introduction
Guidelines for Using SQL Server 2005 Roles and Schemas
Considerations for Using the Code Execution Context Guidelines for
Using Stored Procedures Guidelines for Using Views Self Test
Creating an Auditing Strategy Lesson Introduction Guidelines for
Designing an Auditing Strategy Techniques for Storing Auditing
Information Choosing a Technique for Storing Auditing Information
Guidelines for Protecting Auditing Information Self Test Managing
Multiple Development Teams by Using the Security Features Lesson
Introduction The Common Challenges of Working with Multiple
Development Teams Guidelines for Managing Developer Access by Using
Schemas Guidelines for Auditing Development by Using DDL Triggers
Self Test Lab: Designing a Security Strategy Lesson Introduction
Scenario Exercise: Evaluating the Security Trade-offs of SQL Server
Services Exercise: Designing a Security Strategy Proposed Security
Strategies: Solution A Proposed Security Strategies: Solution B
Proposed Security Strategies: Solution C Lab Review Module Summary
Glossary Module Introduction System Requirements To view this
course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.