SQL Server Security and Auditing

Course:   SS8SEC
Duration:   2 Days
Level:   II
On our website at:   http://www.verhoef-training.com/courses/SS8SEC.html
 
Course Summary

This course is intended for computer auditors and security specialists who need to understand the mechanisms employed to secure a SQL Server installation, and how to successfully audit user access and activity following best practices and guidelines. The coverage of SQL Server security is quite in-depth, and the remaining topics focus on the major tools and techniques utilised for auditing. Albeit that the content and delivery is based on SQL Server 2012, the material covered is widely applicable to securing and auditing SQL Server 2005, 2008 and 2008R2, naturally with the exception of some of the newer features such as Transparent Data Encryption, Contained Databases, User-defined Events etc. Besides excellent coverage of the theory and concepts, time is also devoted to hands-on activities to put into practice the topics introduced in each module.

Topics Covered In This Course

An Introduction to SQL Server

  • Introduction to SQL Server Management Studio (SSMS)
  • System Databases
  • User Databases
  • Database Objects
  • Database and Log File Architecture
  • Filegroups
  • Configuring a Database
  • Configuring a SQL Server System
  • Feature Support Comparison in SQL Server

SQL Server Security

  • Overview of SQL Server Security
  • Service Account Security
  • Configuring Network Protocols and Endpoints
  • Configuring the SQL Server Surface Area
  • Server Level Principals and Securables
  • Database Level Principals and Securables
  • Authorisation through Permissions
  • Impersonation
  • Enhancing Security with Keys and Certificates
  • Signing Code Modules with Signatures
  • Encrypting Data
  • Transparent Data Encryption (TDE)

SQL Server Agent Security

  • SQL Server Agent Service Account Security
  • Managing SQL Server Agent Security

Auditing Techniques

  • Using DML Triggers for Auditing
  • Using DDL Triggers for Auditing
  • Using SQL Server Profiler for Auditing

Dedicated SQL Server Auditing Tools

  • SQL Server Audit Specifications
  • C2 Auditing

Policy Based Management

  • Evaluating and Enforcing Compliance with Policies
  • The Central Management Server

Security and Auditing Best Practices and Guidelines

  • Useful Scripts to Retrieve Security and Related Metadata
  • Useful Guidelines to Implementing Best Practices and Compliance
  • Other Considerations
What You Can Expect

Upon successful completion of this course, students will be able to.

Recommended Prerequisites

It is recommended that before attending this course students possess the following.

Related Courses
Code Course Title Duration Level
SEC4T
Security Awareness For Technologists
2 Days
I
Details
SECVE
Securing the Virtual Environment
3 Days
I
Details

Every student attending a Verhoef Training class will receive a certificate good for $100 toward their next public class taken within a year.

You can also buy "Verhoef Vouchers" to get a discounted rate for a single student in any of our public or web-based classes. Contact your account manager or our sales office for details.