MCITP 70–443: Designing a Database Server Infrastructure by Using Microsoft SQL Server 2005

   
 
 
 
 
 
 
   
 

MCITP 70–443: Designing a Database Server Infrastructure by Using Microsoft SQL Server 2005

MCITP : Database Administrator is the premier certification for database server administrators. The MCITP certification demonstrates that you can keep up with your enterprise business solutions 24 hours a day, 7 days a week.

MCITP : Database administrators install or configure Microsoft SQL Server and manage or maintain databases or multidimensional databases, user accounts, database availability, recovery, and reporting. In addition, MCITP DBA's also design or implement security or server automation and monitor and troubleshoot SQL Server activity. Database administrators are typically employed by mid-size to large organizations.

Audience:
  MCITP Candidates for this Self Paced course are professional database administrators who optimize and maintain database solutions. They have three or more years dedicated to database work, which may include two or more of the following phases in the product lifecycle: design, development, deployment, optimization, maintenance, or support. The typical work environment is an enterprise or a medium-sized organization. MCITP candidates should be experienced in using Microsoft SQL Server 2005.

n Our easy-to-use delivery format allows you to concentrate on the lesson at hand and not how to run the delivery software - saving you time and frustration. Our comprehensive course materials are delivered in an easy-to- understand format - allowing you to get the most out of your time. n

Our courses incorporate audio, video, and text training and then the total experience is reinforced with exercises and practice tests to ensure that you have really grasped the material.

This Course is available online or via DVD's:
Key:
Online Course = All items marked with are included.
DVD Study Kit = Everything! - If its marked with then its included.
For Pricing - Click Here
Live Video,
instructor-led
DVD
Courses =
Interactive
DVD's
Online
Courses =
Online Streaming Video
(Broadband min 512k)
12 Months subscription
Featuring live instructor-led classroom-like sessions in digital video format. Multimedia-rich delivery brings experienced subject matter experts to your desktop or laptop.
Training Simulations  
DVD Courses = Delivered on DVD
Online Courses = Online Access
Interactive hands-on practice lab
Email Support  
 
1 Year's Technical Email Support
E-Books
DVD Courses= Delivered
on DVD
Online Courses = Downloadable
Free Upgrades  
12 months of Free Upgrades.
Compatibility with:  

XP | Win 2003/8 server | Vista
Exam Simulator  
Exam Simulator for closest replication to the real exam!

 

 

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

 

 
 
 

 

   
 
 

(Learning Segments)

 
 
Module 1 - Analyzing Capacity Needs
Lesson 1: Storage Requirements
Determining Current Storage Capacity
Determining the Impact of Regulatory Requirements
Estimating Projected Storage Requirements
Lesson 2: CPU Requirements
Analyzing Current CPU Performance
Choosing a Processor Type
Forecasting CPU Needs
Lesson 3: Memory Requirements
Determining Current Memory Usage
Forecasting Memory Needs
Lesson 4: Network Requirements
Identifying the Database Components of the Topology
Analyzing Current Database Network Traffic
Estimating Network Traffic Growth for Database Servers
Lab 1 Introduction
Module 1 - Review
Module 2 - Data Archiving
Lesson 1: Requirements That Affect Data Archiving
Reasons for Archiving Data
Determining How Much Data Can Be Archived
Determining the Accessibility Requirements of Archived Data
Lesson 2: Structure of Archival Data
Structuring Archival Data
Structure of Archival Data
Lesson 3: Creating a Data Archival Plan
Creating a Data Archival Plan
Deciding What Data to Archive
Selecting a Storage Format for Archival Data
Developing an Archival Data Movement Strategy
Lab 2 Introduction
Module 2 - Review
Module 3 - Database Server Consolidation
Lesson 1: Overview
Benefits
Risks
Lesson 2: Strategy for SQL Server Instances
Installing Multiple Instances
Multiple Instance Design
Lesson 3: Database Server Consolidation Plan
Designing a Consolidation Plan
Creating a Consolidation Plan
Lab 3 Introduction
Module 3 - Review
Module 4 - Data Distribution
Lesson 1: Data Distribution Tools
Why Distribute Data?
Considerations
Tools
Lesson 2: Data Distribution Plans Using Replication
Creating a Data Distribution Plan
Gathering Requirements for Data Distribution
Guidelines for Creating a Data Distribution Plan
Lab 4 Introduction
Module 4 - Review
Module 5 - Designing a Database Server Infrastructure
Lesson 1: Determining the Current
Infrastructure
Assessing the Quality of Database Designs
Assessing the Quality of Database Server Configurations
Assessing Database Storage
Lesson 2: Gathering Requirements for Changing an Infrastructure
Technical Requirements
Business Requirements
Gathering Infrastructure Requirements
Lesson 3: Designing Modifications to an Infrastructure
Database Server Infrastructure Design
Selecting Database Server Hardware and Software
Establishing Database Design and Implementation Policies
Establishing Administrative Policies
Lab 5 Introduction
Module 5 - Review
Module 6 - Data Recovery
Lesson 1: Backup and Restore Strategies
Designing a Backup and Restore Strategy
Analyzing Business Requirements for Data Recovery
Categorizing Databases for Backup and Restore
Protecting Backups
Lesson 2: Creating Disaster Recovery Plans
Recommended Components of a Disaster Recovery Plan
Creating a Disaster Recovery Decision Tree
Documenting a Decision Tree
Best Practices
Lab 6 Introduction
Module 6 - Review
Module 7 - Establishing Database Conventions and Standards
Lesson 1: Database Naming Conventions
Problems with Common Naming Conventions
Establishing Database Naming Conventions
Lesson 2: Database Standards
Types of Standards
SQL Coding Standards
Database Access Standards
Deployment Process Standards
Lab 7 Introduction
Module 7 - Review
Closure

Module 1 - Introduction to Designing SQL Server Security
Security Lesson 1: Principles of Database Security
Principle of Least Privileges
International Common Criteria for Information Technology Security
C2 Compliance Requirements
Lesson 2: Designing a SQL Server Security Policy
Benefits of a Security Policy
Lesson 3: Monitoring SQL Server Security
Auditing Tools
Monitoring Tools
Module 1 - Review
Module 2 - Designing a SQL Server Systems Infrastructure Security Policy
Lesson 1: Integration with Enterprise Authentication Systems
Determining the Appropriate Enterprise Authentication Method
Server-Level Security with Active Directory
Guidelines for Implementing a Server-Level Security Policy
High-Availability Solutions Security
Best Practices
Lesson 2: Windows Server-Level Security Policies
Determining Service Accounts Permissions
Identifying Required Windows Services
Interacting with Network Firewalls
Planning the Physical Security of Servers
Lesson 3: Secure Communication Policy
Choosing Network Libraries
Encryption Methods
Choosing an Appropriate Encryption Method
Securing Communication with Endpoints
Lesson 4: SQL Server Security Monitoring Standards
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 1 Introduction
Module 2 - Review
Module 3 - Designing Security Policies for Instances and Databases
Lesson 1: Instance-Level Security Policy
Determining Authentication Modes and Login Security
Securing the SQL Server Agent Service
Maintaining Updated Hotfixes or Service Packs
Lesson 2: Database-Level Security Policy
Database Schemas
Designing Database Schemas
Designing Database Users’ Privileges
Securing Database-Level DDL Events
Lesson 3: Object-Level Security Policy
Designing a Permission and Data Access Strategy
Securing Module Execution
Designing a Security Policy for CLR Objects
Lesson 4: Security Monitoring Standards for Instances and Databases
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 2 Introduction
Module 3 - Review
Module 4 - Integrating Data Encryption into a Database Security Design
Lesson 1: Securing Data with Encryption and Certificates
What are Certificates?
Determining Data Security Methods
Lesson 2: Data Encryption Policies
Impact of Data Encryption
Lesson 3: Key Storage Method
Selecting a Key Storage Method
Lab 3 Introduction
Module 4 - Review
Module 5 - Designing a Security Exceptions Policy
Lesson 1: Business and Regulatory Requirements
Gathering Business and Regulatory Requirements
Determine Variations
Lesson 2: Exceptions and Their Impact
Determine Possible Exceptions
Evaluating the Impact of Exceptions
Lab 4 Introduction
Module 5 - Review
Module 6 - Designing a Response Strategy for Threats and Attacks
Lesson 1: Designing a Response Policy for Virus and Worm Attacks
Threats by Viruses and Worms
Best Practices
Responding to Virus and Worm Attacks
Lesson 2: Response Policy for Denial of Service Attacks
Symptoms
Possible Responses to a Denial of Service Attack
Lesson 3: Response Policy for Internal and SQL Injection Attacks
Responding to Internal Attacks
Reducing the Likelihood of SQL Injection Attacks
Lab 5 Introduction
Module 6 - Review Closure

 
Course Introduction

Course Introduction
Module 1 - Selecting the Appropriate High-Availability Solution
Selecting the Appropriate High-Availability Solution
Minimum Requirements for a High-Availability Solution
Identifying Requirements and Constraints
Identifying Business Needs
Identifying Technical Constraints
Identifying Failback and Failover Policies
Analyzing Requirements and Constraints
Guidelines for Analyzing Requirements
Analyzing Constraints
Analyzing the Potential Cost of a Solution
Module 1 Review
Module 2 - Designing a Highly Available Database Storage Solution
Designing a Highly Available Database Storage Solution
Storage Requirements for Databases
Storage Requirements for System Databases
Storage Requirements for TempDB
Storage Requirements for Components and Files
Storage Requirements for SQL Server Components
Full-Text Indexes
External Files
Trace and Event Log Files
Log Policies
Backup Files
Storage Solutions for Databases
File and Filegroup Structures for Database Data
File Structures for Transaction Logs
Storage Solutions for System Databases
Backup and Restore Strategy
Designing a Restore Strategy
Designing a Recovery Strategy for System Databases
Designing a Recovery Strategy for User Databases
Designing a Database Strategy That Includes Database Snapshots
Module 2 Review
Module 3 - Designing a Failover Clustering Solution
Designing a Failover Clustering Solution
Designing the Platform for Failover Clustering
Overview of Failover Clustering
Scope of Protection
Key Components of a Cluster Environment
Hardware Requirements for Clustering
Selecting the Appropriate Windows Cluster Topology
Single Instance Cluster
Multiple Instance Cluster
N + 1 Cluster
N + M Cluster
Designing a Geo-Clustering Solution
Network Considerations for a Cluster Environment
Designing the SQL Server Cluster Implementation
Instances and Services
Specifying Processor Resource Configurations
Specifying Memory Configurations
Specifying Network Configurations
Designing Recovery Strategies and a Test Plan
Disaster Recovery Strategy for a Cluster
Test Plan for a SQL Server Cluster
Migrating and Upgrading Clusters
Migration Strategy for a Non-Clustered Instance
Applying Service Packs and Hotfixes
Designing an Operations Plan for Clustering
Designing an Operations Plan
Operational Events Affecting Clustering
Managing Security Events
Managing Incorrect Configuration Settings
Technologies That Complement Clustering
Module 3 Review
Module 4 - Designing a Log Shipping Solution
Designing a Log Shipping Solution
Introduction to Designing a Log Shipping Solution
Scope of Protection
Factors That Impact a Log Shipping Design
Designing Log Shipping Server Roles and Topology
Log Shipping Server Roles and Topology
Process of Changing Server Roles
Designing a Log Shipping Upgrade Strategy
Upgrading from SQL Server 2000 to SQL Server 2005
Applying Service Packs and Hotfixes
Designing an Operations Plan
Events Affecting Log Shipping
Managing Security Events
Managing Environment Differences
Technologies That Complement Log Shipping
Module 4 Review
Module 5 - Designing a Database Mirroring Solution
Designing a Database Mirroring Solution
Introduction
Log Shipping vs. Database Mirroring
Scope of Protection
Modes of Database Mirroring
Factors That Impact a Database Mirroring Design
Designing Database Roles and Topology
Database Roles and Topology
Designing a Database Mirroring Topology
Changing Database Roles
The Impact of Database States on Availability
Testing Database Mirroring
Converting High-Availability Solutions to Database Mirroring
Converting Log Shipping to Database Mirroring
Converting Clustering to Database Mirroring
Designing an Operations Plan
Operational Events Affecting Database Mirroring
Managing Environment Differences
Applying Service Packs and Hotfixes
Technologies That Complement Database Mirroring
Module 5 Review
Module 6 - Designing Replication Solutions for High Availability
Designing Replication Solutions for High Availability
Introduction
Scope of Protection
Types of Replication
Factors To Consider
Designing a Replication Solution
Server Roles and Topology
Selecting Replication Type
Designing Replication Strategies
Immediate/Queued Updating
Merge Replication
Replication-Aware Applications
Designing an Upgrade Strategy
Applying Service Packs and Hotfixes
Operation Plan for Replication
Events Affecting Replication
Operational Events Affecting Replication
Managing Security Events
Managing Environment Differences
Technologies That Complement Replication
Module 6 Review
Module 7 - Combining High-Availability Technologies
Combining High-Availability Technologies
Weaknesses in Each High-Availability Technology
Weaknesses in Clustering
Weaknesses in Log Shipping
Weaknesses in Database Mirroring
Weaknesses in Replication
Combining High-Availability Technologies Cont.
Maximize Availability with Log Shipping
Maximize Availability with Database Mirroring
Maximize Database and Server Availability with Replication
Maximize Database Availability with Clustering
Module 7 Review
Module 8 - Documenting and Testing a High-Availability Strategy
Documenting and Testing a High-Availability Strategy
Documenting High-Availability Solutions
Documenting Business Requirements
Validating the Selected Solution
Documenting the Selected Solution
Documenting the Selected Solution Guidelines
Documenting Failover and Failback Strategies
Documenting Threats to the Selected Solution
Test Plan for High-Availability Solutions
Testing a High-Availability Solution
Determining Performance Benchmarks
Business and Regulatory Requirements
Module 8 Review
Course Closure






 

Full motion video

Each class is presented in full motion video allowing you to see the steps, hear the explanations, and perform the tasks which includes our interactive hands-on training simulations, students will learn from real-world scenarios taught by our expert instructor.

Instructor-Led Training

Combines both the convenience and affordability of computer-based training with the effectiveness of a traditional classroom setting. The instructors featured in our multi-media DVD's are not only certified in their area of expertise, but also have years of real world experience and are subject matter experts in their fields.

E-BOOKS (PDF)

We supply a complete line of e-books to offer a complete training solution. Our courses include e-books for CompTIA, CISCO and Microsoft certifications.Supplied on DVD for DVD courses or downloadable for Online Courses.


Practice Exam Simulators

We offer exam simulators for all technical certifications. Our exam simulators are the closest replication to the real exam!

Our exam simulators creates a simulation of an actual certification exam. Under timed conditions, IntelliSage? sets up a test with 60 randomly chosen questions designed to help you get ready for the real exam. As with the Practice Exam, the Certification Simulator allows you to mark questions you cannot answer for review at the end of the test.
If you ask, IntelliSage? will show you the correct answer. IntelliSage? will also explain why it is the correct answer when you select the "Learn Now" feature. The Practice Exam is the first IntelliSage? step in getting you ready to pass your certification exams.

Hands-on Lab Simulation

Hands-on Lab Simulation is a crucial component of your IT training. Practice make perfect. Step-by-step hands-on labs with detail instructions are included to reinforce all key concepts. When you complete a topic, choose the Lab Simulation button to select the associated hands-on lab exercises. Labs allow you to reinforce concepts by performing the tasks you've just learned..

Free Upgrades

A unique benefit of the our Learning System, is that
it allows you to stay current with the ever-changing certification requirements. When a certification test changes and we produce an upgrade for the certification program, we offer our customers free upgrades on their interactive DVD's for up to 1 year from date of original purchase? absolutely free!

 



MCITP 70–443: Designing a Database Server Infrastructure by Using Microsoft SQL Server 2005

 
 
 
Online Course:£300 ex. VAT
DVD Study Kit: £300 ex. VAT
List Price:£650  
Online Library: 95% off
 
 
 

 
1yr Unlimited Online Access to 143 Courses
Save 95%

      What's included in each option?


 
mcse training
 ©Copyright 2010 All Rights Reserved