Kurz je určen pro ...
Audience The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
[Kurz] Program kurzu (obsah přednášky/semináře/rekvalifikace/studia) ...
Goals After completing this course, students will be able to:
- Authenticate and authorize users
- Assign server and database roles
- Authorize users to access resources
- Protect data with encryption and auditing
- Describe recovery models and backup strategies
- Backup SQL Server databases
- Restore SQL Server databases
- Automate database management
- Configure security for the SQL Server agent
- Manage alerts and notifications
- Managing SQL Server using PowerShell
- Trace access to SQL Server
- Monitor a SQL Server infrastructure
- Troubleshoot a SQL Server infrastructure
- Import and export data
* After completing this course, students will be able to:
- Authenticate and authorize users
- Assign server and database roles
- Authorize users to access resources
- Protect data with encryption and auditing
- Describe recovery models and backup strategies
- Backup SQL Server databases
- Restore SQL Server databases
- Automate database management
- Configure security for the SQL Server agent
- Manage alerts and notifications
- Managing SQL Server using PowerShell
- Trace access to SQL Server
- Monitor a SQL Server infrastructure
- Troubleshoot a SQL Server infrastructure
- Import and export data
Outline Module 1: Authenticating and Authorizing Users This module covers SQL Server security models, logins, and users. Lessons
- Authenticating connections to SQL Server
- Authorizing logins to access databases
- Authorization across servers
- Partially contained databases
Lab : Authenticating Users After completing this module, you will be able to:
- Describe server level security
- Describe database level security
- Describe multi-server authentication
- Describe partially contained databases
Module 2: Assigning Server and Database Roles This module covers fixed server roles, user-defined server roles, fixed database roles, and user-defined database roles. Lessons
- Working with server roles
- Working with Fixed database roles
- Creating user-defined database roles
Lab : Assigning server and database roles After completing this module, you will be able to:
- Describe server roles
- Describe fixed database roles
- Describe user-defined database roles
Module 3: Authorizing Users to Access Resources This module covers permissions and the assignment of permissions. Lessons
- Authorizing user access to objects
- Authorizing users to execute code
- Configuring permissions at the schema level
Lab : Authorizing users to access resources After completing this module, you will be able to:
- Describe how to authorize user access to objects
- Describe how to authorize users to execute code
- Describe how to configure permissions at the schema level
Module 4: Protecting Data with Encryption and Auditing This module covers SQL Server Audit. Lessons
- Options for auditing data access in SQL Server
- Implementing SQL Server audit
- Managing SQL Server audit
- Protecting data with encryption
Lab : Using Auditing and Encryption After completing this module, you will be able to:
- Describe options for auditing data access.
- Implement SQL Server Audit.
- Manage SQL Server Audit.
- Describe how to use custom audit events.
- Implement encryption
Module 5: SQL Server Recovery Models This module describes the concept of the transaction log and SQL Server recovery models. It also introduces the different