Description
Introduction
In this course, you design SQL Server instance-level,
database-level, and object-level security policies. You also learn
the security monitoring standards for instances and databases.
This course also helps prepare you for certification exam
70-443.
Objectives
At the end of the course, students
will be able to:
- Design Security Policies for Instances and Databases
- Design an Instance-level Security Policy
- Design a Database-Level Security Policy
- Design an Object-level Security Policy
- Define Security Monitoring Standards for Instances and
Databases
Modules &
Lessons
Course Overview
Module Introduction
Navigation Overview
Lab Information
Designing Security Policies fo…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this course, you design SQL Server instance-level,
database-level, and object-level security policies. You also learn
the security monitoring standards for instances and databases.
This course also helps prepare you for certification exam
70-443.
Objectives At the end of the course, students will be able to:
- Design Security Policies for Instances and Databases
- Design an Instance-level Security Policy
- Design a Database-Level Security Policy
- Design an Object-level Security Policy
- Define Security Monitoring Standards for Instances and
Databases
Modules & Lessons Course Overview Module Introduction
Navigation Overview Lab Information Designing Security Policies for
Instances and Databases Module Introduction Designing an
Instance-Level Security Policy Lesson Introduction Guidelines for
Determining Authentication Modes and Logon Security Considerations
for Designing a Secure Endpoint Strategy Determining the
Appropriate Endpoint Authentication Type Guidelines for Securing
the SQL Server Agent Service Guidelines for Securing Instance-Level
DDL Events Guidelines for Maintaining Updated Hot Fixes or Service
Packs Self Test Designing a Database-Level Security Policy Lesson
Introduction Guidelines for Designing Database Roles Considerations
for Designing Database Schemas Guidelines for Designing Database
Users’ Privileges Guidelines for Securing Database-Level DDL Events
Identifying the Considerations for Database-Level Security Self
Test Designing an Object-Level Security Policy Lesson Introduction
Guidelines for Designing a Permissions and Data Access Strategy
Considerations for Designing the Execution Context Considerations
for Securing Module Execution Guidelines for Designing a Security
Policy for CLR Objects Identifying Code Access Permission Sets Self
Test Defining Security Monitoring Standards for Instances and
Databases Lesson Introduction Guidelines for Identifying What to
Monitor Guidelines for Determining the Classification System for
Alerts Guidelines for Determining the Notification Policy
Determining the Classification System and Notification Policy Self
Test Lab A: Designing Security Policies for Instances and Databases
Lesson Introduction Scenario Exercise: Designing an Instance-Level
Security Policy Exercise: Designing a Database-Level Security
Policy Exercise: Designing an Object-Level Security Policy Lab
Review Lab B: Validating Security Policies for Instances and
Databases Lesson Introduction Scenario Exercise Lab Review Module
Summary Glossary Module Introduction System Requirements To view
this course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.