Description
Introduction
In this course, you implement server-level security using
authentication methods. You also gain the knowledge required to
develop a Microsoft Windows server-level security policy.
This course also helps prepare you for certification exam
70-443.
Objectives
At the end of the course, students
will be able to:
- Design a SQL Server Systems Infrastructure Security Policy
- Integrate with Enterprise Authentication Systems
- Develop Windows Server-Level Security Policies
- Define SQL Server Security Monitoring Standards
Modules &
Lessons
Course Overview
Module Introduction
Navigation Overview
Lab Information
Designing a SQL Server Systems
Infrastructure Security Policy
Modul…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this course, you implement server-level security
using authentication methods. You also gain the knowledge required
to develop a Microsoft Windows server-level security policy.
This course also helps prepare you for certification exam
70-443.
Objectives At the end of the course, students will be able to:
- Design a SQL Server Systems Infrastructure Security Policy
- Integrate with Enterprise Authentication Systems
- Develop Windows Server-Level Security Policies
- Define SQL Server Security Monitoring Standards
Modules & Lessons Course Overview Module Introduction
Navigation Overview Lab Information Designing a SQL Server Systems
Infrastructure Security Policy Module Introduction Integrating with
Enterprise Authentication Systems Lesson Introduction
Considerations for Determining the Enterprise Authentication Method
Implementing Server-Level Security with Active Directory Guidelines
for Implementing a Server-Level Security Policy Security Impact on
High-Availability Solutions Best Practices for Integrating with
Enterprise Authentication Systems Self Test Developing Windows
Server-Level Security Policies Lesson Introduction Guidelines for
Developing a Password Policy Guidelines for Protecting Passwords
and Applications Guidelines for Determining Service Accounts
Permissions Guidelines for Identifying Required Windows Services
Best Practices for Interacting with Network Firewalls
Considerations for Planning the Physical Security of the Server
Self Test Developing a Secure Communication Policy Lesson
Introduction Guidelines for Choosing Network Libraries Encryption
Methods Guidelines for Choosing an Appropriate Encryption Method
SQL Server 2005 Endpoints Guidelines for Using Endpoints to Secure
Communication Selecting an Appropriate Communication Policy Self
Test Defining SQL Server Security Monitoring Standards Lesson
Introduction Guidelines for Identifying What to Monitor Guidelines
for Determining the Classification System for Alerts Guidelines for
Determining the Notification Policy Determining the Classification
System and Notification Policy Self Test Lab A: Designing a SQL
Server Systems Infrastructure Security Policy Lesson Introduction
Scenario Exercise: Developing Microsoft Windows Server-Level
Security Policies Exercise: Developing a Secure Communication
Policy Exercise: Integrating SQL Server Security Lab Review Lab B:
Validating a Systems Infrastructure Security Policy Lesson
Introduction Scenario Exercise Lab Review Module Summary Glossary
Module Introduction System Requirements To view this course, you
need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.