Designing Security For Micrsofot SQL Server 205

Aliware
A Torino

560 
+IVA
Vuoi parlare del corso con un consulente?
Confronta questo corso con altri simili
Leggi tutto

Informazione importanti

  • Corso
  • Torino
Descrizione

Obiettivo del corso: This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL Server 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design.
Rivolto a: This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Informazione importanti
Sedi

Dove e quando

Inizio Luogo
Consultare
Torino
Via Matteo Pescatore 15, 10124, Torino, Italia
Visualizza mappa

Cosa impari in questo corso?

SQL

Programma

Preliminary Course

Syllabus

Designing Security for Microsoft SQL

Server 2005

Elements of this syllabus are subject to change.

This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL Server 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.

Audience

This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.

Prerequisites

Before attending this course, students must:

· Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos.

· Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for.

· Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc.

· Have working knowledge of

Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs).

· Be able to design a database to third normal form (3NF) and know the trade offs when backing out of the fully normalized design (denormalization) and designing for performance and business requirements in addition to being familiar with design models, such as Star and Snowflake schemas.

· Have strong monitoring and troubleshooting skills.

· Have experience creating Microsoft

Visio® drawings or have equivalent knowledge.

· Have strong knowledge of the operating system and platform. That is, how the operating system integrates with the database, what the platform or operating system can do, interaction between the operating system and the database.

· Have basic knowledge of application architecture. That is, different methods of implementing security in an application, how applications can be designed in three layers, what applications can do, the interaction between applications and the database, and interactions between the database and the platform or operating system.

· Have knowledge about network security tools. For example, sniffer and port scanning. Must understand how they should be used.

· Be able to use patch management systems.

· Have knowledge of common attack methods. For example, buffer overflow, replay attacks, etc.

· Be familiar with SQL Server 2005 features, tools, and technologies.

· Have a Microsoft®

Certified Technology Specialist: Microsoft SQL Server 2005 credential or equivalent experience.

In addition, it is recommended, but not required, that students have completed:

· Course 2778, Writing Queries Using Microsoft SQL Server 2005 Transact-SQL.

· Course 2779, Implementing a Microsoft SQL Server 2005 Database.

· Course 2780, Maintaining a Microsoft SQL Server 2005 Database.

Module 1: Introduction to Designing SQL Server SecurityThis module introduces the principles and methodology of designing

SQL Server security. This module also explains the benefits of having a security policy in place and the process of creating a security policy. In addition, this module teaches you the importance of monitoring the security of SQL

Server.

Lessons

§ Principles of DatabaseSecurity

§ Methodology for Designing aSQL Server Security Policy

§ Monitoring SQL Server

Security

After completing this module, students will be able to:

§ Explain the principles of SQL

Server security.

§ Describe the methodology to design a SQL Server security policy.

§ Explain the importance of monitoring SQL Server security.

Module 2: Designing a SQL Server Systems Infrastructure SecurityPolicy

This module provides the guidelines for implementing server-level security using authentication methods. This module also provides the knowledge required to develop a Microsoft Windows® server-level security policy. To enable you to do this, this module provides the guidelines to create password policy and determine service accounts permissions. In addition, this module explains how to select an appropriate encryption method to develop a secure communication policy. This module also explains the monitoring standards for SQL Server.

Lessons

§ Integrating with EnterpriseAuthentication Systems

§ Developing WindowsServer-level Security Policies

§ Developing a SecureCommunication Policy

§ Defining SQL Server Security

Monitoring Standards

Lab 2A: Designing a SQL

Server Systems Infrastructure Security Policy

§ Developing Microsoft WindowsServer-level Security Policies

§ Developing a SecureCommunication Policy

§ Integrating SQL ServerSecurity Within the Active Directory Environment

§ Integrating SQL ServerSecurity With Firewall Configurations

§ Discussing Systems

Infrastructure Security Integration

Lab 2B: Creating an

Infrastructure Security Inventory

§ Auditing the SQL ServerLogins

§ Auditing the Windows LocalPassword Policy

§ Auditing SQL Server ServiceAccounts

§ Monitoring Security at the Enterprise and Server

Levels

After completing this module, students will be able to:

§ Integrate SQL Server security with enterprise-level authentication systems.

§ Develop Windows server-level security policies.

§ Develop a secure communication policy.

§ Define security monitoring standards for SQL Server at the enterprise and server level.

Module 3: Designing Security Policies for Instances and Databases

This module explains how to design SQL Server instance-level, database-level, and object-level security policies. This module teaches the security monitoring standards for instances and databases.

Lessons

§ Designing an Instance-levelSecurity Policy

§ Designing a Database-levelSecurity Policy

§ Designing an Object-levelSecurity Policy

§ Defining Security Monitoring

Standards for Instances and Databases

Lab 3A: Designing

Security Policies for Instances and Databases

§ Designing an Instance-level SecurityPolicy

§ Designing a Database-level SecurityPolicy

§ Designing an Object-level SecurityPolicy

§ Discussing Database Security

Exceptions

Lab 3B: Validating

Security Policies for Instances and Databases

§ Auditing Existing ServerLogins

§ Auditing SQL Server RolesMembership

§ Analyzing Existing ObjectPermissions

§ Monitoring Security at the

Instance and Database Level

After completing this module, students will be able to:

§ Design a SQL Server instance-level security policy.

§ Design a database-level security policy.

§ Design an object-level security policy.

§ Define security monitoring standards for instances and databases.

Module 4: Integrating Data Encryption into a Database SecurityDesign

This module provides the guidelines and considerations for security data using encryption and certificates. This module also describes various data encryption policies. Finally, this module shows how to determine a key storage method.

Lessons

§ Securing Data by UsingEncryption and Certificates

§ Designing Data EncryptionPolicies

§ Determining a Key Storage

Method

Lab 4: Integrating Data

Encryption into a Database Security Design

§ Selecting a Data SecurityMethod

§ Designing a Data EncryptionSecurity Policy

§ Selecting a Key Storage

Method

After completing this module, students will be able to:

§ Secure data by using encryption and certificates.

§ Design data encryption policies.

§ Determine a key storage method.

Module 5: Designing a Security Exceptions Policy

This module provides guidelines for gathering business and regulatory requirements and comparing them with existing policy. This module also covers how to determine the exceptions and their impact on security.

Lessons

§ Analyzing Business andRegulatory Requirements

§ Determining the Exceptions and their Impact

Lab 5: Designing a Security

Exceptions Policy

§ Identifying Variations from the Security Policy

§ Obtaining Approval of theSecurity Policy

§ Discussing the Results of

Policy Approval Presentations

After completing this module, students will be able to:

§ Analyze business and regulatory requirements.

§ Determine the exceptions and their impact on security.

Module 6: Designing a Response Strategy for Threats and Attacks

This module provides guidelines to respond to virus and worm attacks, denial-of-service attacks, and injection attacks.

Lessons

§ Designing a Response Policy for Virus and Worm Attacks

§ Designing a Response Policy for Denial-of-Service Attacks

§ Designing a Response Policy for Internal and SQL Injection Attacks

Lab 6: Designing a

Response Strategy for Threats and Attacks

§ Designing a Response Policy forVirus and Worm Attacks

§ Designing a Response Policy forDenial-of-Service Attacks

§ Designing a Response Policy forInternal Attacks

§ Validating a Security Policy

After completing this module, students will be able to:

§ Design a response policy for virus and worm attacks.

§ Design a response policy to handle the denial-of-service attacks.

§ Design a response policy to prevent internal and SQL injection attacks.

Confronta questo corso con altri simili
Leggi tutto