Module 1 - Analyzing Capacity Needs
Lesson 1: Storage Requirements
Determining Current Storage Capacity
Determining the Impact of Regulatory Requirements
Estimating Projected Storage Requirements
Lesson 2: CPU Requirements
Analyzing Current CPU Performance
Choosing a Processor Type
Forecasting CPU Needs
Lesson 3: Memory Requirements
Determining Current Memory Usage
Forecasting Memory Needs
Lesson 4: Network Requirements
Identifying the Database Components of the Topology
Analyzing Current Database Network Traffic
Estimating Network Traffic Growth for Database Servers
Lab 1 Introduction
Module 1 - Review
Module 2 - Data Archiving
Lesson 1: Requirements That Affect Data Archiving
Reasons for Archiving Data
Determining How Much Data Can Be Archived
Determining the Accessibility Requirements of Archived Data
Lesson 2: Structure of Archival Data
Structuring Archival Data
Structure of Archival Data
Lesson 3: Creating a Data Archival Plan
Creating a Data Archival Plan
Deciding What Data to Archive
Selecting a Storage Format for Archival Data
Developing an Archival Data Movement Strategy
Lab 2 Introduction
Module 2 - Review
Module 3 - Database Server Consolidation
Lesson 1: Overview
Benefits
Risks
Lesson 2: Strategy for SQL Server Instances
Installing Multiple Instances
Multiple Instance Design
Lesson 3: Database Server Consolidation Plan
Designing a Consolidation Plan
Creating a Consolidation Plan
Lab 3 Introduction
Module 3 - Review
Module 4 - Data Distribution
Lesson 1: Data Distribution Tools
Why Distribute Data?
Considerations
Tools
Lesson 2: Data Distribution Plans Using Replication
Creating a Data Distribution Plan
Gathering Requirements for Data Distribution
Guidelines for Creating a Data Distribution Plan
Lab 4 Introduction
Module 4 - Review
Module 5 - Designing a Database Server Infrastructure
Lesson 1: Determining the Current
Infrastructure
Assessing the Quality of Database Designs
Assessing the Quality of Database Server Configurations
Assessing Database Storage
Lesson 2: Gathering Requirements for Changing an Infrastructure
Technical Requirements
Business Requirements
Gathering Infrastructure Requirements
Lesson 3: Designing Modifications to an Infrastructure
Database Server Infrastructure Design
Selecting Database Server Hardware and Software
Establishing Database Design and Implementation Policies
Establishing Administrative Policies
Lab 5 Introduction
Module 5 - Review
Module 6 - Data Recovery
Lesson 1: Backup and Restore Strategies
Designing a Backup and Restore Strategy
Analyzing Business Requirements for Data Recovery
Categorizing Databases for Backup and Restore
Protecting Backups
Lesson 2: Creating Disaster Recovery Plans
Recommended Components of a Disaster Recovery Plan
Creating a Disaster Recovery Decision Tree
Documenting a Decision Tree
Best Practices
Lab 6 Introduction
Module 6 - Review
Module 7 - Establishing Database Conventions and Standards
Lesson 1: Database Naming Conventions
Problems with Common Naming Conventions
Establishing Database Naming Conventions
Lesson 2: Database Standards
Types of Standards
SQL Coding Standards
Database Access Standards
Deployment Process Standards
Lab 7 Introduction
Module 7 - Review
Closure
Module 1 - Introduction to Designing SQL Server Security
Security Lesson 1: Principles of Database Security
Principle of Least Privileges
International Common Criteria for Information Technology Security
C2 Compliance Requirements
Lesson 2: Designing a SQL Server Security Policy
Benefits of a Security Policy
Lesson 3: Monitoring SQL Server Security
Auditing Tools
Monitoring Tools
Module 1 - Review
Module 2 - Designing a SQL Server Systems Infrastructure Security Policy
Lesson 1: Integration with Enterprise Authentication Systems
Determining the Appropriate Enterprise Authentication Method
Server-Level Security with Active Directory
Guidelines for Implementing a Server-Level Security Policy
High-Availability Solutions Security
Best Practices
Lesson 2: Windows Server-Level Security Policies
Determining Service Accounts Permissions
Identifying Required Windows Services
Interacting with Network Firewalls
Planning the Physical Security of Servers
Lesson 3: Secure Communication Policy
Choosing Network Libraries
Encryption Methods
Choosing an Appropriate Encryption Method
Securing Communication with Endpoints
Lesson 4: SQL Server Security Monitoring Standards
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 1 Introduction
Module 2 - Review
Module 3 - Designing Security Policies for Instances and Databases
Lesson 1: Instance-Level Security Policy
Determining Authentication Modes and Login Security
Securing the SQL Server Agent Service
Maintaining Updated Hotfixes or Service Packs
Lesson 2: Database-Level Security Policy
Database Schemas
Designing Database Schemas
Designing Database Users’ Privileges
Securing Database-Level DDL Events
Lesson 3: Object-Level Security Policy
Designing a Permission and Data Access Strategy
Securing Module Execution
Designing a Security Policy for CLR Objects
Lesson 4: Security Monitoring Standards for Instances and Databases
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 2 Introduction
Module 3 - Review
Module 4 - Integrating Data Encryption into a Database Security Design
Lesson 1: Securing Data with Encryption and Certificates
What are Certificates?
Determining Data Security Methods
Lesson 2: Data Encryption Policies
Impact of Data Encryption
Lesson 3: Key Storage Method
Selecting a Key Storage Method
Lab 3 Introduction
Module 4 - Review
Module 5 - Designing a Security Exceptions Policy
Lesson 1: Business and Regulatory Requirements
Gathering Business and Regulatory Requirements
Determine Variations
Lesson 2: Exceptions and Their Impact
Determine Possible Exceptions
Evaluating the Impact of Exceptions
Lab 4 Introduction
Module 5 - Review
Module 6 - Designing a Response Strategy for Threats and Attacks
Lesson 1: Designing a Response Policy for Virus and Worm Attacks
Threats by Viruses and Worms
Best Practices
Responding to Virus and Worm Attacks
Lesson 2: Response Policy for Denial of Service Attacks
Symptoms
Possible Responses to a Denial of Service Attack
Lesson 3: Response Policy for Internal and SQL Injection Attacks
Responding to Internal Attacks
Reducing the Likelihood of SQL Injection Attacks
Lab 5 Introduction
Module 6 - Review Closure
|