Course 3317: Designing a Response Strategy for Threats and Attacks Against Microsoft SQL Server 2005

Product type

Course 3317: Designing a Response Strategy for Threats and Attacks Against Microsoft SQL Server 2005

Microsoft Learning
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction In this course, you apply guidelines to respond to virus and worm attacks, denial-of-service attacks, and injection attacks.

This course also helps prepare you for certification exam 70-443.

Objectives At the end of the course, students will be able to:
  • Design a Response Strategy for Threats and Attacks
  • Design a Response Policy for Virus and Worm Attacks
  • Design a Response Policy for Denial-of-Service Attacks
  • Design a Response Policy for Internal and SQL Injection Attacks
Modules & Lessons Course Overview Module Introduction Navigation Overview Designing a Response Strategy for Threats and Attacks Module Introduction Designing a Response Policy for Virus and Wor…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Microsoft SQL Server, Strategy, PL/SQL, Microsoft ProClarity, and Client - Server.

Introduction In this course, you apply guidelines to respond to virus and worm attacks, denial-of-service attacks, and injection attacks.

This course also helps prepare you for certification exam 70-443.

Objectives At the end of the course, students will be able to:
  • Design a Response Strategy for Threats and Attacks
  • Design a Response Policy for Virus and Worm Attacks
  • Design a Response Policy for Denial-of-Service Attacks
  • Design a Response Policy for Internal and SQL Injection Attacks
Modules & Lessons Course Overview Module Introduction Navigation Overview Designing a Response Strategy for Threats and Attacks Module Introduction Designing a Response Policy for Virus and Worm Attacks Lesson Introduction Threats to SQL Server by Viruses and Worms Best Practices for Reducing the Likelihood of Virus and Worm Attacks Guidelines for Responding to Virus and Worm Attacks Preparing a Response Strategy Self Test Designing a Response Policy for Denial of Service Attacks Lesson Introduction Symptoms of a Denial of Service Attack Identifying Symptoms of a Denial of Service Attack Determining the Appropriate Response to a Denial of Service Attack Self Test Designing a Response Policy for Internal and SQL Injection Attacks Lesson Introduction Guidelines for Responding to Internal Attacks Responding to Internal Attacks What is a SQL Injection Attack? Guidelines for Reducing the Likelihood of SQL Injection Attacks Self Test Lab: Designing a Response Strategy for Threats and Attacks Lesson Introduction Scenario Exercise: Designing a Response Policy for Virus and Worm Attacks Exercise: Designing a Response Policy for Denial of Service Attacks Exercise: Designing a Response Policy for Internal Attacks Lab Review Module Summary Glossary Module Introduction System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.