Course 3316: Designing a Microsoft SQL Server 2005 Security Exceptions Policy

Product type
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction In this course, you gather business and regulatory requirements and compare them with existing policy. You also determine the exceptions and their impact on security.

This course also helps prepare you for certification exam 70-443.

Objectives At the end of the course, students will be able to:
  • Design a Security Exceptions Policy
  • Analyze Business and Regulatory Requirements
  • Determine the Exceptions and Their Impact
Modules & Lessons Course Overview Module Introduction Navigation Overview Designing a Security Exceptions Policy Module Introduction Analyzing Business and Regulatory Requirements Lesson Introduction Guidelines for Gathering Business and Regulato…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Policy Studies, Microsoft SQL Server, PL/SQL, Security, and CompTIA A+ / Network+ / Security+.

Introduction In this course, you gather business and regulatory requirements and compare them with existing policy. You also determine the exceptions and their impact on security.

This course also helps prepare you for certification exam 70-443.

Objectives At the end of the course, students will be able to:
  • Design a Security Exceptions Policy
  • Analyze Business and Regulatory Requirements
  • Determine the Exceptions and Their Impact
Modules & Lessons Course Overview Module Introduction Navigation Overview Designing a Security Exceptions Policy Module Introduction Analyzing Business and Regulatory Requirements Lesson Introduction Guidelines for Gathering Business and Regulatory Requirements Determining Variations Determining Variations Between Existing Policy and Requirements Self Test Determining Exceptions and Their Impact Lesson Introduction Determining Exceptions Guidelines for Evaluating the Impact of Exceptions Determining the Security Impact of Variations Self Test Lab: Designing a Security Exceptions Policy Lesson Introduction Scenario Exercise: Identifying Variations from the Security Policy Exercise: Creating a Security Infrastructure Exceptions Policy Lab Review Module Summary Glossary Module Introduction System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.