This On Demand online training provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.
Nutzen
Details anzeigen
After completing this online training, students will be able to:
Authenticate and authorize users
Assign server and database roles
Authorize users to access resources
Protect data with encryption and auditing
Describe recovery models and backup strategies
Backup SQL Server databases
Restore SQL Server databases
Automate database management
Configure security for the SQL Server agent
Manage alerts and notifications
Managing SQL Server using PowerShell
Trace access to SQL Server
Monitor a SQL Server infrastructure
Troubleshoot a SQL Server infrastructure
Import and export data
The training also prepares you für the SQL MCSA exam 70-764.
Zielgruppe
The primary audience for this online training is IT professionals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
Voraussetzungen
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
Basic knowledge of the Microsoft Windows operating system and its core functionality.
Working knowledge of Transact-SQL.
Working knowledge of relational databases.
Some experience with database design.
Inhalte des Seminars
Details anzeigen
Module 1: SQL Server Security
Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization.
Module 2: Assigning Server and Database Roles
Using roles simplifies the management of user permissions. With roles, you can control authenticated users access to system resources based on each users job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level.
Module 3: Authorizing Users to Access Resources
In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.
Module 4: Protecting Data with Encryption and Auditing
When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organizations compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
Module 5: Recovery Models and Backup Strategies
One of the most important aspects of a database administrators role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organizations operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.
Module 6: Backing Up SQL Server Databases
In the previous module, you lear
Wichtige Hinweise
MOC On Demand Trainings sind original Microsoft Trainings, in denen Sie zeit- und ortsungebunden lernen können.
Diese Trainings enthalten:
Zugang zum offiziellen Microsoft Video on Demand Kurs für 90 Tage ab dem ersten Zugriff.
Einen Lab-Online-Zugang für praktische Übungen, der ab Kauf 6 Monate gültig ist.
Eine originale MOC Schulungsunterlage in digitaler Form, wie sie auch in den Live-Trainings eingesetzt wird.
Weitere Details entnehmen Sie unserer MOC On Demand Landingpage unter www.tuv.com/Microsoft
Zurzeit sind leider keine Termine verfügbar.
Kontaktieren Sie uns, wenn Sie Interesse an dieser Weiterbildung haben: