Module 1 - Introduction to Designing SQL Server Security
Security Lesson 1: Principles of Database Security
Principle of Least Privileges
International Common Criteria for Information Technology Security
C2 Compliance Requirements
Lesson 2: Designing a SQL Server Security Policy
Benefits of a Security Policy
Lesson 3: Monitoring SQL Server Security
Auditing Tools
Monitoring Tools
Module 1 - Review
Module 2 - Designing a SQL Server Systems Infrastructure Security Policy
Lesson 1: Integration with Enterprise Authentication Systems
Determining the Appropriate Enterprise Authentication Method
Server-Level Security with Active Directory
Guidelines for Implementing a Server-Level Security Policy
High-Availability Solutions Security
Best Practices
Lesson 2: Windows Server-Level Security Policies
Determining Service Accounts Permissions
Identifying Required Windows Services
Interacting with Network Firewalls
Planning the Physical Security of Servers
Lesson 3: Secure Communication Policy
Choosing Network Libraries
Encryption Methods
Choosing an Appropriate Encryption Method
Securing Communication with Endpoints
Lesson 4: SQL Server Security Monitoring Standards
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 1 Introduction
Module 2 - Review
Module 3 - Designing Security Policies for Instances and Databases
Lesson 1: Instance-Level Security Policy
Determining Authentication Modes and Login Security
Securing the SQL Server Agent Service
Maintaining Updated Hotfixes or Service Packs
Lesson 2: Database-Level Security Policy
Database Schemas
Designing Database Schemas
Designing Database Users’ Privileges
Securing Database-Level DDL Events
Lesson 3: Object-Level Security Policy
Designing a Permission and Data Access Strategy
Securing Module Execution
Designing a Security Policy for CLR Objects
Lesson 4: Security Monitoring Standards for Instances and Databases
Determining What to Monitor
Determining the Classification System for Alerts
Determining the Notification Policy
Lab 2 Introduction
Module 3 - Review
Module 4 - Integrating Data Encryption into a Database Security Design
Lesson 1: Securing Data with Encryption and Certificates
What are Certificates?
Determining Data Security Methods
Lesson 2: Data Encryption Policies
Impact of Data Encryption
Lesson 3: Key Storage Method
Selecting a Key Storage Method
Lab 3 Introduction
Module 4 - Review
Module 5 - Designing a Security Exceptions Policy
Lesson 1: Business and Regulatory Requirements
Gathering Business and Regulatory Requirements
Determine Variations
Lesson 2: Exceptions and Their Impact
Determine Possible Exceptions
Evaluating the Impact of Exceptions
Lab 4 Introduction
Module 5 - Review
Module 6 - Designing a Response Strategy for Threats and Attacks
Lesson 1: Designing a Response Policy for Virus and Worm Attacks
Threats by Viruses and Worms
Best Practices
Responding to Virus and Worm Attacks
Lesson 2: Response Policy for Denial of Service Attacks
Symptoms
Possible Responses to a Denial of Service Attack
Lesson 3: Response Policy for Internal and SQL Injection Attacks
Responding to Internal Attacks
Reducing the Likelihood of SQL Injection Attacks
Lab 5 Introduction
Module 1 - Managing and Automating Databases and Servers
Lesson 1: An Automated System for Database Maintenance
Automating Database Administration
Using SQL Server Agent
Assessing System Dependencies on the Database
Identifying Maintenance Needs
Automating Database Maintenance Plans
Lesson 2: An Automated System for Server Maintenance
Implementing Application Database Changes
Implementing Windows and SQL Server Updates
Lesson 3: Administration and Automation Information
Maintaining a Run Book
The SQL Health and History Tool
Additional Automation Tools
Lab 1 Introduction
Module 2 - Review
Module 2 - Managing SQL Server Supporting Services
Lesson 1: SSIS Packages
SSIS Packages
Monitoring SSIS Packages
Lesson 2: Replication
Choosing Replication Monitoring Tools
Lesson 3: Reporting Services
Managing the Report Server Configuration
Managing Report Services Databases
Managing Report Servers
Module 2 - Review
|