Corporate HomeCorporate ProfileWorldwide OfficesSolutions At WorkEmployment  
LRS Education Services
LEARN  >  Find a Class  >  Class Summary

MS2787 - Designing Security for Microsoft SQL Server 2005

If you have any questions about registering for this class, please call (877) 832-0688 Ext. 1493 or email us at
This course enables database administrators who work with enterprise environments to design security for database systems using Microsoft® SQL Server 2005. The course emphasizes that students should think about the whole environment, which includes business needs, regulatory requirements and network systems, and database considerations during design. Students will also learn how to monitor security and respond to threats.
Click here for a printer-friendly version of this page.
This course has not been scheduled yet. Please contact us by clicking the link below to learn about availability.
Contact us for additional availability.


Before attending this course, students must: Have basic knowledge of security protocols and how they work. For example, NTLM or Kerberos. Have basic knowledge of public key infrastructure (PKI) systems. For example, how public and private keys work, strengths and weaknesses, and what they are used for. Have working knowledge of network architectures and technologies. For example, how a firewall works, how IPSec works in networking context, common vulnerability points, etc. Have working knowledge of Active Directory directory service. For example, security models, policies, group policy objects (GPOs), and organizational units (OUs). Be able to design a database to third normal form (3NF) and know the trade offs when backing out of the fully normalized design (denormalization) and designing for performance and business requirements in addition to being familiar with design models, such as Star and Snowflake schemas. Have strong monitoring and troubleshooting skills.
Detailed Class Syllabus

Introduction to Designing SQL Server Security
  • Principles of Database Security

  • Methodology for Designing a SQL Server Security Policy

  • Monitoring SQL Server Security

  • Designing a SQL Server Systems Infrastructure Security Policy
  • Integrating with Enterprise Authentication Systems

  • Developing Windows Server-level Security Policies

  • Developing a Secure Communication Policy

  • Defining SQL Server Security Monitoring Standards

  • Designing Security Policies for Instances and Databases
  • Designing an Instance-level Security Policy

  • Designing a Database-level Security Policy

  • Designing an Object-level Security Policy

  • Defining Security Monitoring Standards for Instances and Databases

  • Integrating Data Encryption into a Database Security Design
  • Securing Data by Using Encryption and Certificates

  • Designing Data Encryption Policies

  • Determining a Key Storage Method

  • Designing a Security Exceptions Policy
  • Analyzing Business and Regulatory Requirements

  • Determining the Exceptions and their Impact

  • Designing a Response Strategy for Threats and Attacks
  • Designing a Response Policy for Virus and Worm Attacks

  • Designing a Response Policy for Denial-of-Service Attacks

  • Designing a Response Policy for Internal and SQL Injection Attacks
    Microsoft Partner Gold LearningPearson VUE Authorized Test CenterEC-Council