arrow

SQL Server Security

termin_icon Prvi termin: 9.2 - 9.2
confirmed_icon Izvedba potrjena Ne
duration_icon Trajanje (dni) 1
price_icon Cena brez DDV 360,00 €
num_of_hours_icon Število ped. ur 8

Predavatelji

Oznaka tečaja: SQL-S SATV voucher: Ne

Summary:

Security is maybe the single most important area of contemporary IT operations. SQL Server can help you securing your data in many ways. This course teaches database administrators and database developers about all of the SQL Server security features available.

Abstract:

SQL Server has numerous options for tightening the security in all stages of a database lifecycle, starting with preparing a secure environment. SQL Server helps you configuring minimal surface area and assess the vulnerabilities of your database. Then you continue with defining the core permissions in your database – who can see and who can modify which part of it. You can enhance the security by using the programmable objects. SQL Server also enables very detailed column-level and row-level predicate permissions. Encrypting the data can be done in different ways, including the Always Encrypted option, where even the database administrator (DBA) cannot see the data. Instead of encrypting, you can also dynamically mask data.

Preventing data leaks is one part of a secure system. Auditing access to the data might be equally important. SQL Server gives you auditing capabilities out of the box. You can also track all changes of the data and get the state of the data in any time point in the past with system versioned tables. Finally, you can also classify your data in order to inform users that they are dealing with sensitive data.

Modules:

  1. Introduction to SQL Server security
  2. Preparing a secure environment
    • Surface area configuration
    • Vulnerability assessment
    • Policy-based management
  3. Classical permissions model
    • Defining principals and securables
    • Managing schemas
    • Object and statement permissions
  4. Row-level security
    • Using programmable objects
    • Code injection issues
    • Predicate-based RLS
  5. Encryption
    • Backup encryption
    • Encrypting on a column level
    • Transparent data encryption
    • Always encrypted
  6. Auditing
    • Using SQL Audit
    • System versioned (temporal) tables
  7. Soft methods
    • Dynamic data masking
    • Data discovery and classification

Prijavnica (velja kot naročilnica)

Udeleženec

Plačnik

Shranjujem

Potrebuješ pomoč?
Potrebuješ pomoč?