The training is designed for all those who want to acquire knowledge about database security in general and Microsoft SQL Server.
Trainees are required to have knowledge of the Windows environment and familiarity with Microsoft SQL Server environment.
This training course is designed to familiarize participants with the security principles of relational databases, learn how to manage security copies and manage user access rights to specific resources. Participants will also learn how to securely store data and "hide" sensitive information, but will also learn how to monitor the database and server for security.
Upon completion of the training, the participant:
▪ will be familiar with the security principles of relational databases
▪ will know how to use copies of databases
▪ will be able to extract interesting data from the database
▪ will be able to manage user access rights to specific resources
▪ will know how to store data securely
▪ will know how to "hide" sensitive information
▪ will know how to monitor the database and server for security.
01. PREPARING THE DEVELOPMENT ENVIRONMENT
➡ SQL Server Configuration Manager.
➡ SQL Server Management Studio (SSMS).
➡ Setting up the database for this training course
➡ DBO and data preparation
02. DATA BACKUP
➡ Creating an archiving (BACKUP) of the database
➡ Restoring databases from the archive: BACKUP
03. DATABASE SCHEMAS
➡ Default DBO schema.
➡ Custom schemas
04. DYNAMIC QUERIES
➡ DYNAMIC QUERY
➡ EXEC / EXECUTE
➡ SQL INJECTION
05. DATA HASHING AND CHECKSUMS
➡ HASHBYTES, CHECKSUM, BINARY_CHECKSUM
06. ADVANCED OPERATIONS
➡ NOCHECK, DISABLE, SET
07. DATABASE SECURITY
➡ Security basics: identification, authentication, authorization
➡ Server users and user accounts
➡ Server accounts
➡ Database accounts
➡ Server account management
➡ User management
➡ Server roles
➡ Database roles
➡ User roles
➡ Role management
➡ Commands: GRANT, DENY, REVOKE
08. SMUDGE, OBFUSCATE CODE
➡ Options: ENCRYPTION, VIEW_METADATA
09. DATABASE AND SERVER MONITORING
➡ Use of RAM, disks, processors, network interfaces
➡ Checking executed SQL queries
➡ Active sessions
➡ Recent connections
➡ Most expensive and blocked queries
➡ TEMPDB space
➡ Sessions using the most space in TEMPDB
➡ Resource allocation
10. USEFUL TOOLS
➡ Activity Monitor
➡ Performance Monitor
Polska - Ms SQL Server - Bezpieczeństwo Baz Danych
Slovenia - Ms SQL Server - Database Security
Croatia - Ms SQL Server - Database Security
Serbia - Ms SQL Server - Database Security
Bhutan - Ms SQL Server - Database Security