Course 3176: Designing a Security Strategy for a Microsoft SQL Server 2005 Database Solution

Product type

Course 3176: Designing a Security Strategy for a Microsoft SQL Server 2005 Database Solution

Microsoft Learning
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction In this 2 hour course you will learn how to plan for security during the design phase including designing a security strategy for the various components of a SQL Server 2005 solution. You will also learn how to choose an authentication and authorization strategy, design security for various solution components, design objects, and create an auditing strategy for your solution.

This course will also help prepare you for certification exam 70-441.

Objectives At the end of the course, students will be able to:
  • Design a security strategy for the components of a SQL Server 2005 solution.
  • Design objects to manage application access
  • Create an auditing strategy
  • Manage multiple develop…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Strategy, Security, Microsoft SQL Server, CompTIA A+ / Network+ / Security+, and Internet Security.

Introduction In this 2 hour course you will learn how to plan for security during the design phase including designing a security strategy for the various components of a SQL Server 2005 solution. You will also learn how to choose an authentication and authorization strategy, design security for various solution components, design objects, and create an auditing strategy for your solution.

This course will also help prepare you for certification exam 70-441.

Objectives At the end of the course, students will be able to:
  • Design a security strategy for the components of a SQL Server 2005 solution.
  • Design objects to manage application access
  • Create an auditing strategy
  • Manage multiple development teams by using the SQL Server 2005 security features.
Modules & Lessons Course Overview Module Introduction Navigation Overview Lab Information Designing a Server-Side Solution for SQL Server 2005 Designing a Security Strategy Module Introduction Designing a Security Strategy for the Components of a Solution Lesson Introduction Considerations for Choosing Authentication Modes The Process for Defining an Authorization Strategy Guidelines for Designing Security for Reporting Services Guidelines for Designing Security for Notification Services Considerations for Designing Security for Integration Services Considerations for Designing Security for Replication Self Test Designing Objects to Manage Application Access Lesson Introduction Guidelines for Using SQL Server 2005 Roles and Schemas Considerations for Using the Code Execution Context Guidelines for Using Stored Procedures Guidelines for Using Views Self Test Creating an Auditing Strategy Lesson Introduction Guidelines for Designing an Auditing Strategy Techniques for Storing Auditing Information Choosing a Technique for Storing Auditing Information Guidelines for Protecting Auditing Information Self Test Managing Multiple Development Teams by Using the Security Features Lesson Introduction The Common Challenges of Working with Multiple Development Teams Guidelines for Managing Developer Access by Using Schemas Guidelines for Auditing Development by Using DDL Triggers Self Test Lab: Designing a Security Strategy Lesson Introduction Scenario Exercise: Evaluating the Security Trade-offs of SQL Server Services Exercise: Designing a Security Strategy Proposed Security Strategies: Solution A Proposed Security Strategies: Solution B Proposed Security Strategies: Solution C Lab Review Module Summary Glossary Module Introduction System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.