Курс M2787: Разработка безопасности для Microsoft SQL Server 2005
Цена для физических лиц, р.: 9000 Цена для юридических лиц, р.: 11000
Продолжительность курса (дней): 2
Даты (день):
Даты (вечер):
Цель: This two-day instructor-led course enables database administrators who work with enterprise environments to design security for database systems using Microsoft SQL Server 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.
This course is intended for current professional database administrators who have three or more years of on-the-job experience administering SQL Server database solutions in an enterprise environment.
Необходимая подготовка: для успешного усвоения материалов данного курса необходим навык чтения текста на английском языке, а также следующие знания и навыки:
• Have basic knowledge of security protocols and how they work. For example,
NTLM or Kerberos.
• Have basic knowledge of public key infrastructure (PKI) systems. For example,
how public and private keys work, strengths and weaknesses, and what they are
used for.
• Have working knowledge of network architectures and technologies. For example,
how a firewall works, how IPSec works in networking context, common
vulnerability points, etc.
• Have working knowledge of Active Directory directory service. For example,
security models, policies, group policy objects (GPOs), and organizational units
(OUs).
• Be able to design a database to third normal form (3NF) and know the trade
offs when backing out of the fully normalized design (denormalization) and
designing for performance and business requirements in addition to being
familiar with design models, such as Star and Snowflake schemas.
• Have strong monitoring and troubleshooting skills.
• Have experience creating Microsoft Visio drawings or have equivalent knowledge.
• Have strong knowledge of the operating system and platform. That is, how the
operating system integrates with the database, what the platform or operating
system can do, interaction between the operating system and the database.
• Have basic knowledge of application architecture. That is, different methods
of implementing security in an application, how applications can be designed in
three layers, what applications can do, the interaction between applications and
the database, and interactions between the database and the platform or
operating system.
• Have knowledge about network security tools. For example, sniffer and port
scanning. Must understand how they should be used.
• Be able to use patch management systems.
• Have knowledge of common attack methods. For example, buffer overflow, replay
attacks, etc.
• Be familiar with SQL Server 2005 features, tools, and technologies.
• Have a Microsoft Certified Technology Specialist: Microsoft SQL Server 2005
credential or equivalent experience.
In addition, it is recommended, but not required, that students have completed:
• Course 2778, Writing Queries Using Microsoft SQL Server 2005 Transact-SQL.
• курс
2779 Implementing a Microsoft SQL Server 2005 Database.
• курс
2780 Maintaining a Microsoft SQL Server 2005 Database.
Хотите записаться?
info@stars-s.ru,
Skype или наши много-канальные телефоны :
+7 (495) 363-36-86
План курса:
Module 1: Introduction to Designing SQL Server Security
This module introduces the principles and methodology of designing SQL Server security. This module also explains the benefits of having a security policy in place and the process of creating a security policy. In addition, this module teaches you the importance of monitoring the security of SQL Server.
Lessons
Principles of Database Security. Methodology for Designing a SQL Server Security Policy. Monitoring SQL Server Security
After completing this module, students will be able to:
Explain the principles of SQL Server security. Describe the methodology to design a SQL Server security policy. Explain the importance of monitoring SQL Server security.
Module 2: Designing a SQL Server Systems Infrastructure Security Policy
This module provides the guidelines for implementing server-level security using authentication methods. This module also provides the knowledge required to develop a Microsoft Windows server-level security policy. To enable you to do this, this module provides the guidelines to create password policy and determine service accounts permissions. In addition, this module explains how to select an appropriate encryption method to develop a secure communication policy. This module also explains the monitoring standards for SQL Server.
Lessons
Integrating with Enterprise Authentication Systems. Developing Windows Server-level Security Policies. Developing a Secure Communication Policy. Defining SQL Server Security Monitoring Standards
Lab 2A: Designing a SQL Server Systems Infrastructure Security Policy
Developing Microsoft Windows Server-level Security Policies. Developing a Secure Communication Policy. Integrating SQL Server Security Within the Active Directory Environment. Integrating SQL Server Security With Firewall Configurations. Discussing Systems Infrastructure Security Integration
Lab 2B: Creating an Infrastructure Security Inventory
Auditing the SQL Server Logins. Auditing the Windows Local Password Policy. Auditing SQL Server Service Accounts. Monitoring Security at the Enterprise and Server Levels
After completing this module, students will be able to:
Integrate SQL Server security with enterprise-level authentication systems. Develop Windows server-level security policies. Develop a secure communication policy. Define security monitoring standards for SQL Server at the enterprise and server level.
Module 3: Designing Security Policies for Instances and Databases
This module explains how to design SQL Server instance-level, database-level, and object-level security policies. This module teaches the security monitoring standards for instances and databases.
Lessons
Designing an Instance-level Security Policy. Designing a Database-level Security Policy. Designing an Object-level Security Policy. Defining Security Monitoring Standards for Instances and Databases
Lab 3A: Designing Security Policies for Instances and Databases
Designing an Instance-level Security Policy. Designing a Database-level Security Policy. Designing an Object-level Security Policy. Discussing Database Security Exceptions
Lab 3B: Validating Security Policies for Instances and Databases
Auditing Existing Server Logins. Auditing SQL Server Roles Membership. Analyzing Existing Object Permissions. Monitoring Security at the Instance and Database Level
After completing this module, students will be able to:
Design a SQL Server instance-level security policy. Design a database-level security policy. Design an object-level security policy. Define security monitoring standards for instances and databases.
Module 4: Integrating Data Encryption into a Database Security Design
This module provides the guidelines and considerations for security data using encryption and certificates. This module also describes various data encryption policies. Finally, this module shows how to determine a key storage method.
Lessons
Securing Data by Using Encryption and Certificates. Designing Data Encryption Policies. Determining a Key Storage Method
Lab 4: Integrating Data Encryption into a Database Security Design
Selecting a Data Security Method. Designing a Data Encryption Security Policy. Selecting a Key Storage Method
After completing this module, students will be able to:
Secure data by using encryption and certificates. Design data encryption policies. Determine a key storage method.
Module 5: Designing a Security Exceptions Policy
This module provides guidelines for gathering business and regulatory requirements and comparing them with existing policy. This module also covers how to determine the exceptions and their impact on security.
Lessons
Analyzing Business and Regulatory Requirements. Determining the Exceptions and their Impact
Lab 5: Designing a Security Exceptions Policy
Identifying Variations from the Security Policy. Obtaining Approval of the Security Policy. Discussing the Results of Policy Approval Presentations
After completing this module, students will be able to:
Analyze business and regulatory requirements. Determine the exceptions and their impact on security.
Module 6: Designing a Response Strategy for Threats and Attacks
This module provides guidelines to respond to virus and worm attacks, denial-of-service attacks, and injection attacks.
Lessons
Designing a Response Policy for Virus and Worm Attacks. Designing a Response Policy for Denial-of-Service Attacks. Designing a Response Policy for Internal and SQL Injection Attacks
Lab 6: Designing a Response Strategy for Threats and Attacks
Designing a Response Policy for Virus and Worm Attacks. Designing a Response Policy for Denial-of-Service Attacks. Designing a Response Policy for Internal Attacks. Validating a Security Policy
After completing this module, students will be able to:
Design a response policy for virus and worm attacks. Design a response policy to handle the denial-of-service attacks. Design a response policy to prevent internal and SQL injection attacks.