Designing a Database Server Security Solution

Practice Labs Module
Time
1 hour 10 minutes
Difficulty
Intermediate

The Designing a Database Server Security Solution module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises: Designing Instance Authentication, Designing Instance Level Security Configurations, Designing Database Schema and Object...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Overview

Introduction

The Designing a Database Server Security Solution module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

  1. Designing Instance Authentication
  2. Designing Instance Level Security Configurations
  3. Designing Database Schema and Object Security Parameters
  4. Designing a Security Policy and an Audit Plan
  5. Designing an Encryption Strategy

Exercise 1 - Designing instance authentication

In this exercise, you will perform the tasks required to create logon triggers. You will also learn about these triggers and their usage. To gain an understanding of these command-line tools, refer to your course material or read the material available at the following link from http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx

Choosing authentication type

Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication authenticates the user to the database using a database user name and password. Windows authentication is also referred to as "Windows Integrated Security" or a "trusted connection" because it relies on the user being authenticated, or “trusted,” by the operating system. Windows authentication is the authentication mode recommended by Microsoft.

Exercise 2 - Designing instance level security configurations

In this exercise, you will perform the tasks required to design instance-level security. To understand these command-line tools, refer to your course material or read the material available at the following link on http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx

Exercise 3 - Designing database schema and object security parameters

In this exercise, you will perform the tasks required to install and configure the common language runtime (CLR) in SQL Server 2008 R2. You will also understand various roles provided in the framework of SQL Server 2008. To understand these command-line tools, refer to your course material or read the material available at the following http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx

Exercise 4 - Designing a security policy and an audit plan

In this exercise, you will perform the tasks required to design a security policy and an audit plan. To understand these concepts, refer to your course material or read the material available at the following http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx

Exercise 5 - Designing an encryption strategy

In this exercise, you will perform the tasks required to design the encryption strategies in SQL server 2008 using various techniques and encryption methodologies. To understand these technologies, refer to your course material or read the material available at the following link from http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.