Designing a Database Server Security Solution
The Designing a Database Server Security Solution module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises: Designing Instance Authentication, Designing Instance Level Security Configurations, Designing Database Schema and Object...

Introduction
The Designing a Database Server Security Solution module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
- Designing Instance Authentication
- Designing Instance Level Security Configurations
- Designing Database Schema and Object Security Parameters
- Designing a Security Policy and an Audit Plan
- Designing an Encryption Strategy
Exercise 1 - Designing instance authentication
In this exercise, you will perform the tasks required to create logon triggers. You will also learn about these triggers and their usage. To gain an understanding of these command-line tools, refer to your course material or read the material available at the following link from http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx
Choosing authentication type
Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication authenticates the user to the database using a database user name and password. Windows authentication is also referred to as "Windows Integrated Security" or a "trusted connection" because it relies on the user being authenticated, or “trusted,” by the operating system. Windows authentication is the authentication mode recommended by Microsoft.
Exercise 2 - Designing instance level security configurations
In this exercise, you will perform the tasks required to design instance-level security. To understand these command-line tools, refer to your course material or read the material available at the following link on http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx
Exercise 3 - Designing database schema and object security parameters
In this exercise, you will perform the tasks required to install and configure the common language runtime (CLR) in SQL Server 2008 R2. You will also understand various roles provided in the framework of SQL Server 2008. To understand these command-line tools, refer to your course material or read the material available at the following http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx
Exercise 4 - Designing a security policy and an audit plan
In this exercise, you will perform the tasks required to design a security policy and an audit plan. To understand these concepts, refer to your course material or read the material available at the following http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx
Exercise 5 - Designing an encryption strategy
In this exercise, you will perform the tasks required to design the encryption strategies in SQL server 2008 using various techniques and encryption methodologies. To understand these technologies, refer to your course material or read the material available at the following link from http://technet.microsoft.com/en-us/library/ms130214(SQL.100).aspx
See the full benefits of our immersive learning experience with interactive courses and guided career paths.