Fard Solutions Consulting understands our client busy schedules that do not allow for prolonged travel to a distant training facility. For this matter we created In-House training whereby our trainer will personally conduct the training in clients’ office. Our training classes can accommodate classroom sizes from up to twenty five(25), but we have found fifteen (15) or fewer students per class to be the most productive experience for our participants. We ensure every participant has all the tools they need to succeed in every class.
What we offer?
- Our participants enjoy a true technical, “hands-on” experience, with virtual images on each participant’s personalized computer. Our training lab utilizes our simple yet effective format of Learn it, Do it, Prove it. Every class is comprised of PowerPoint-driven lectures and “hands-on” labs.
- We have created training classes and the ability to custom-create Quest training courses that meet your company’s specific needs.
- At the end of the training we provide quick reference booklet to every participants which is the summary of every custom course we trained.
Title: FS-3010A Microsoft SQL Server Security & Protection
Duration: 2 Days
Time: 09:00 am – 05:00 pm
This course is intended for:
- SQL Server administrators who are responsible for the security of their database servers and installation.
- SQL Server developers who are responsible for developing SQL Server queries and stored procedures and security objects such as Logins, Users, Keys and Certificates.
- Experience with SQL Server.
- Understanding of Database concept.
- Experience with SQL Server administration.
- Experience with Transact-SOL Programming.
- Knowledge of SQL Server security concept.
Course Outline:Module 1
: Introduction to SQL Server Security
- SQL Server Security Levels
- SQL Server Service Account Login
- SQL Server Service Master Key
- SQL Server Database Master Key
- SQL Server Encryption Algorithms
- SQL Server Database Encryption Internal Process
- SQL Server Server Roles
- SQL Server Database Roles
- SQL Server Edition Comparison
: Server and Network Security
- Choosing an Account for Running SQL Server
- Managing Service SIDs
- Using a Virtual Service Account
- Encrypting the Session with SSL
- Configuring a Firewall for SQL Server Access
- Disabling SQL Server Browser
- Stopping Unused Services
- Using Transparent Database Encryption
- Securing Linked Server Access
- Configuring Endpoint Security
- Limiting Functionalities
: User Authentication, Authorization and Security
- Windows vs. SQL Server Authentication
- Login Management
- Brute-Force Attack Solution
- Limiting SA Account Privileges
- Giving Granular Server Privileges
- Preventing User and Login to See Metadata
- Contained Database
- Resolving Mismatch SID Issue
: Protecting the Data
- Understanding Permissions
- Assigning Column-Level Permission
- Database Roles
- Application Role
- Using Schema for Security
- Managing Object Ownership
- Protecting Data Through Views and Procedures
- Configuring Cross-Database Security
- Change User Execution Context
: Code and Data Encryption
- Encryption Introduction
- Using Service and Database Master Keys
- Symmetric Key Encryption
- Asymmetric Key Encryption
- Creating and Using Certificate
- Encrypting Data with Symmetric Key
- Encrypting Data with Asymmetric Key
- Storing Hash Values
- Signing Data
- Signing Stored Procedures
- Resolving Permission Chaining in Double Hops.
- Replace Ownership Chaining by Certificates
: Attacks and Injections
- Defining CAS in .Net Assemblies
- Deploying .Net Assemblies by Asymmetric Key
- Protecting SQL Server Against Denial-Of-Service Attack
- Protecting SQL Server Against SQL Injection
- Protecting Dynamic SQL from SQL Injection
- Protecting SQL Server Using SQL Firewall or Web Application Firewall
: Securing SQL Agent Service
- Choosing the Right Service Account
- Creating Credential and Proxy
- Allowing Users to Create and Run Their Own SQL Agent Jobs
Module 8 : Securing SQL Server Service-Broker
- Setting up Secure Transportation for Service-Broker
- Setting up Secure Dialog for Service-Broker
: SQL Server High Availability Security
- Securing SQL Server Replication
- Securing SQL Server Database-Mirroring
: SQL Server Auditing
- Using Profiler to Audit SQL Server Access
- Using DML Trigger to Audit Data Modification
- Using DDL Trigger to Audit Structure Modification
- Configuring SQL Server Audit Object
- Auditing and Tracing User–Configurable Events
- Using Common Criteria Compliance (C2)
- Using Microsoft System Center to Analyze SQL Server Instances
- Using Microsoft SQL Server Best Practice Analyzer
- Using Policy-Based Management
- Securing the SQL Server Instance
- Securing Databases
- Providing Proper Authentication Mode
- Providing Granular Permission for Every Login and User
- Applying Encryption
- Applying Cross-Database Ownership