20764B Administering A SQL Database Infrastructure

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

CENTER OF KNOWLEDGE, PATH TO SUCCESS

Website: www.info-trek.com

20764B: ADMINISTERING A SQL • Authenticate and authorize users


DATABASE INFRASTRUCTURE • Assign server and database roles
• Authorize users to access resources
Course: 20764B; Duration: 5 Days; Instructor- • Protect data with encryption and
led Classroom auditing
• Describe recovery models and backup
strategies
WHAT YOU WILL LEARN • Backup SQL Server databases
This five-day instructor-led course provides • Restore SQL Server databases
students who administer and maintain SQL • Automate database management
Server databases with the knowledge and • Configure security for the SQL Server
agent
skills to administer a SQL server database
• Manage alerts and notifications
infrastructure. Additional it will be of use to • Managing SQL Server using PowerShell
individuals who develop applications that • Trace access to SQL Server
deliver content from SQL Server databases. • Monitor a SQL Server infrastructure
• Troubleshoot a SQL Server
AUDIENCE infrastructure
The primary audience for this course is • Import and export data
individuals who administer and maintain SQL
Server databases. These individuals perform
COURSE OUTLINE
database administration and maintenance as
their primary area of responsibility, or work in
Module 1: SQL Server Security
environments where databases play a key role
Protection of data within your Microsoft SQL
in their primary job. Server databases is essential and requires a
The secondary audiences for this course are working knowledge of the issues and SQL
individuals who develop applications that Server security features. This module
deliver content from SQL Server databases. describes SQL Server security models, logins,
users, partially contained databases, and
PREREQUISITES cross-server authorization.
In addition to their professional experience,
students who attend this training should Lessons
• Authenticating Connections to SQL
already have the following technical knowledge
Server
including basic knowledge of the Microsoft • Authorizing Logins to Connect to
Windows operating system and its core databases
functionality, working knowledge of Transact- • Authorization Across Servers
SQL, working knowledge of relational • Partially Contained Databases
databases and some experience with database
Lab : Authenticating Users
design.
• Create Logins
• Create Database Users
METHODOLOGY • Correct Application Login Issues
This program will be conducted with • Configure Security for Restored
interactive lectures, PowerPoint presentations, Databases
discussions and practical exercises
After completing this module, you will be able
COURSE OBJECTIVES to:
Upon completion of this program, participants • SQL Server basic concepts.
should be able to :

20764A: Administering a SQL Database Infrastructure


| Page 1 of 6
• SQL Server connection authentication. on the database objects are best configured at
• User login authorization to databases. the schema level rather than at the level of the
• Partially contained databases. individual object. Schema-based permission
• Authorization across servers. grants can simplify your security architecture.
You will explore the granting of permissions at
Module 2: Assigning Server and Database the schema level in the final lesson of this
Roles module.
Using roles simplifies the management of user Lessons
permissions. With roles, you can control • Authorizing User Access to Objects
authenticated users’ access to system • Authorizing Users to Execute Code
resources based on each user’s job function— • Configuring Permissions at the Schema
rather than assigning permissions user-by- Level
user, you can grant permissions to a role, then Lab : Authorizing users to access
make users members of roles. Microsoft SQL resources
Server includes support for security roles • Granting, Denying, and Revoking
defined at server level and at database level. Permissions on Objects
• Granting EXECUTE Permissions on Code
Lessons • Granting Permissions at the Schema
• Working with server roles Level
• Working with Fixed Database Roles After completing this module, you will be able
• Assigning User-Defined Database Roles to:
• Authorize user access to objects.
Lab : Assigning server and database roles • Authorize users to execute code.
• Assigning Server Roles • Configure permissions at the schema
• Assigning Fixed Database Roles level.
• Assigning User-Defined Database Roles
• Verifying Security Module 4: Protecting Data with Encryption
and Auditing
After completing this module, you will be able When configuring security for your Microsoft
to: SQL Server systems, you should ensure that
• Describe and use server roles to you meet any of your organization’s
manage server-level security. compliance requirements for data protection.
• Describe and use fixed database roles. Organizations often need to adhere to
• Use custom database roles and industry-specific compliance policies, which
application roles to manage database- mandate auditing of all data access. To
level security. address this requirement, SQL Server provides
a range of options for implementing auditing.
Module 3: Authorizing Users to Access Another common compliance requirement is
Resources the encryption of data to protect against
In the previous modules, you have seen how unauthorized access in the event that access
Microsoft SQL Server security is organized and to the database files is compromised. SQL
how sets of permissions can be assigned at the Server supports this requirement by providing
server and database level by using fixed transparent data encryption (TDE). To reduce
server roles, user-defined server roles, fixed the risk of information leakage by users with
database roles, and application roles. The final administrative access to a database, columns
step in authorizing users to access SQL Server containing sensitive data—such as credit card
resources is the authorization of users and numbers or national identity numbers—can be
roles to access server and database objects. In encrypted using the Always Encrypted feature.
this module, you will see how these object This module describes the available options for
permissions are managed. In addition to auditing in SQL Server, how to use and
access permissions on database objects, SQL manage the SQL Server Audit feature, and
Server provides the ability to determine which how to implement encryption.
users are allowed to execute code, such as
stored procedures and functions. In many Lessons
cases, these permissions and the permissions

20764A: Administering a SQL Database Infrastructure


| Page 2 of 6
www.info-trek.com
• Options for auditing data access in SQL • Describe how database transaction logs
Server function.
• Implementing SQL Server Audit • Plan SQL Server backup strategies.
• Managing SQL Server Audit
• Protecting Data with Encryption Module 6: Backing Up SQL Server
Databases
Lab : Using Auditing and Encryption In the previous module, you learned how to
• Working with SQL Server Audit plan a backup strategy for a SQL Server
• Encrypt a Column as Always Encrypted system. You can now learn how to perform
• Encrypt a Database using TDE SQL Server backups, including full and
After completing this module, you will be able differential database backups, transaction log
to: backups, and partial backups. In this module,
• Describe the options for auditing data you will learn how to apply various backup
access. strategies.
• Implement SQL Server Audit.
• Manage SQL Server Audit. Lessons
• Describe and implement methods of • Backing Up Databases and Transaction
encrypting data in SQL Server. Logs
• Implement encryption • Managing Database Backups
• Advanced Database Options
Module 5: Recovery Models and Backup
Strategies Lab : Backing Up Databases
• Backing Up Databases
One of the most important aspects of a • Performing Database, Differential, and
database administrator's role is ensuring that Transaction Log Backups
organizational data is reliably backed up so • Performing a Partial Backup
that, if a failure occurs, you can recover the After completing this module, you will be able
data. Even though the computing industry has to:
known about the need for reliable backup • Perform backups of SQL Server
strategies for decades—and discussed this at databases and transaction logs.
great length—unfortunate stories regarding • Manage database backups.
data loss are still commonplace. A further • Describe advanced backup options.
problem is that, even when the strategies in
place work as they were designed, the Module 7: Restoring SQL Server 2016
outcomes still regularly fail to meet an Databases
organization’s operational requirements. In In the previous module, you learned how to
this module, you will consider how to create a create backups of Microsoft SQL Server 2016
strategy that is aligned with organizational databases. A backup strategy might involve
needs, based on the available backup models, many different types of backup, so it is
and the role of the transaction logs in essential that you can effectively restore them.
maintaining database consistency. You will often be restoring a database in an
urgent situation. You must, however, ensure
Lessons that you have a clear plan of how to proceed
• Understanding Backup Strategies and successfully recover the database to the
• SQL Server Transaction Logs required state. A good plan and understanding
• Planning Backup Strategies of the restore process can help avoid making
the situation worse. Some database restores
Lab : Understanding SQL Server recovery are related to system failure. In these cases,
models you will want to return the system as close as
• Plan a Backup Strategy possible to the state it was in before the
• Configure Database Recovery Models failure. Some failures, though, are related to
After completing this module, you will be able human error and you might wish to recover
to: the system to a point before that error. The
• Describe various backup strategies. point-in-time recovery features of SQL Server
2016 can help you to achieve this. Because

20764A: Administering a SQL Database Infrastructure


| Page 3 of 6
www.info-trek.com
they are typically much larger, user databases
are more likely to be affected by system Lab : Automating SQL Server Management
failures than system databases. However, • Create a SQL Server Agent Job
system databases can be affected by failures, • Test a Job
and special care should be taken when • Schedule a Job
recovering them. In particular, you need to • Configure Master and Target Servers
understand how to recover each system After completing this module, you will be able
database because you cannot use the same to:
process for all system databases. In this • Describe methods for automating SQL
module, you will see how to restore user and Server Management.
system databases and how to implement • Configure jobs, job step types, and
point-in-time recovery. schedules.
• Manage SQL Server Agent jobs.
Lessons • Configure master and target servers.
• Understanding the Restore Process
• Restoring Databases Module 9: Configuring Security for SQL
• Advanced Restore Scenarios Server Agent
• Point-in-Time Recovery Other modules in this course have
demonstrated the need to minimize the
Lab : Restoring SQL Server Databases permissions that are granted to users,
• Restoring a Database Backup following the principle of “least privilege.” This
• Restring Database, Differential, and means that users have only the permissions
Transaction Log Backups that they need to perform their tasks. The
• Performing a Piecemeal Restore same logic applies to the granting of
After completing this module, you will be able permissions to SQL Server Agent. Although it
to: is easy to execute all jobs in the context of the
• Explain the restore process. SQL Server Agent service account, and to
• Restore databases. configure that account as an administrative
• Perform advanced restore operations. account, a poor security environment would
• Perform a point-in-time recovery. result from doing this. It is important to
understand how to create a minimal privilege
Module 8: Automating SQL Server security environment for jobs that run in SQL
Management Server Agent.
The tools provided by Microsoft SQL Server
make administration easy when compared to Lessons
some other database engines. However, even • Understanding SQL Server Agent
when tasks are easy to perform, it is common Security
to have to repeat a task many times. Efficient • Configuring Credentials
database administrators learn to automate • Configuring Proxy Accounts
repetitive tasks. This can help to avoid
situations where an administrator forgets to Lab : Configuring Security for SQL Server
execute a task at the required time. Perhaps Agent
more importantly, the automation of tasks • Analyzing Problems in SQL Server
helps to ensure that they are performed Agent
consistently, each time they are executed. This • Configuring a Credential
module describes how to use SQL Server • Configuring a Proxy Account
Agent to automate jobs, how to configure • Configuring and testing the Security
security contexts for jobs, and how to Context of a Job
implement multiserver jobs. After completing this module, you will be able
to:
Lessons • Explain SQL Server Agent security.
• Automating SQL Server management • Configure credentials.
• Working with SQL Server Agent • Configure proxy accounts.
• Managing SQL Server Agent Jobs
• Multi-server Management

20764A: Administering a SQL Database Infrastructure


| Page 4 of 6
www.info-trek.com
Module 10: Monitoring SQL Server with • Configure SQL Server using PowerShell
Alerts and Notifications • Administer and Maintain SQL Server
One key aspect of managing Microsoft SQL with PowerShell
Server in a proactive manner is to make sure • Managing Azure SQL Databases using
you are aware of problems and events that PowerShell
occur in the server, as they happen. SQL
Server logs a wealth of information about Lab : Using PowerShell to Manage SQL
issues. You can configure it to advise you Server
automatically when these issues occur, by • Getting Started with PowerShell
using alerts and notifications. The most • Using PowerShell to Change SQL Server
common way that SQL Server database settings
administrators receive details of events of After completing this module, you will be able
interest is by email message. This module to:
covers the configuration of Database Mail, • Describe the benefits of PowerShell and
alerts, and notifications for a SQL Server its fundamental concepts.
instance, and the configuration of alerts for • Configure SQL Server by using
Microsoft Azure SQL Database PowerShell.
• Administer and maintain SQL Server by
Lessons using PowerShell.
• Monitoring SQL Server Errors • Manage an Azure SQL Database by
• Configuring Database Mail using PowerShell.
• Operators, Alerts, and Notifications
• Alerts in Azure SQL Database Module 12: Tracing Access to SQL Server
with Extended events
Lab : Monitoring SQL Server with Alerts Monitoring performance metrics provides a
and Notifications great way to assess the overall performance of
• Configuring Database Mail a database solution. However, there are
• Configuring Operators occasions when you need to perform more
• Configuring Alerts and Notifications detailed analysis of the activity occurring
• Testing Alerts and Notifications within a Microsoft SQL Server instance—to
After completing this module, you will be able troubleshoot problems and identify ways to
to: optimize workload performance. SQL Server
• Monitor SQL Server errors. Extended Events is a flexible, lightweight
• Configure database mail. event-handling system built into the Microsoft
• Configure operators, alerts, and SQL Server Database Engine. This module
notifications. focuses on the architectural concepts,
• Work with alerts in Azure SQL troubleshooting strategies and usage scenarios
Database. of Extended Events.

Module 11: Introduction to Managing SQL Lessons


Server by using PowerShell • Extended Events Core Concepts
This module looks at how to use Windows • Working with Extended Events
PowerShell with Microsoft SQL Server.
Businesses are constantly having to increase Lab : Extended Events
the efficiency and reliability of maintaining • Using the System_Health Extended
their IT infrastructure; with PowerShell, you Events Session
can improve this efficiency and reliability by • Tracking Page Splits Using Extended
creating scripts to carry out tasks. PowerShell Events
scripts can be tested and applied multiple After completing this module, you will be able
times to multiple servers, saving your to:
organization both time and money. • Describe Extended Events core
concepts.
Lessons • Create and query Extended Events
• Getting Started with Windows sessions.
PowerShell

20764A: Administering a SQL Database Infrastructure


| Page 5 of 6
www.info-trek.com
• Troubleshoot and Resolve a Service
Module 13: Monitoring SQL Server Issue
The Microsoft SQL Server Database Engine can • Troubleshoot and Resolve a Windows
run for long periods without the need for Login Issue
administrative attention. However, if you • Troubleshoot and Resolve a Job
regularly monitor the activity that occurs on Execution Issue
the database server, you can deal with • Troubleshoot and Resolve a
potential issues before they arise. SQL Server Performance Issue
provides a number of tools that you can use to After completing this module, you will be able
monitor current activity and record details of to:
previous activity. You need to become familiar • Describe a troubleshooting
with what each of the tools does and how to methodology for SQL Server.
use them. It is easy to become overwhelmed • Resolve service-related issues.
by the volume of output that monitoring tools • Resolve login and connectivity issues.
can provide, so you also need to learn
techniques for analyzing their output. Module 15: Importing and Exporting Data
While a great deal of data residing in a
Lessons Microsoft SQL Server system is entered
• Monitoring activity directly by users who are running application
• Capturing and Managing Performance programs, there is often a need to move data
Data in other locations, to and from SQL Server.
• Analyzing Collected Performance Data SQL Server provides a set of tools you can use
• SQL Server Utility to transfer data in and out. Some of these
tools, such as the bcp (Bulk Copy Program)
Lab : Monitoring SQL Server utility and SQL Server Integration Services,
are external to the database engine. Other
After completing this module, you will be able tools, such as the BULK INSERT statement and
to: the OPENROWSET function, are implemented
• Monitor current activity. in the database engine. With SQL Server, you
• Capture and manage performance data. can also create data-tier applications that
• Analyze collected performance data. package all the tables, views, and instance
• Configure SQL Server Utility. objects associated with a user database into a
single unit of deployment. In this module, you
Module 14: Troubleshooting SQL Server will explore these tools and techniques so that
Database administrators working with you can import and export data to and from
Microsoft SQL Server need to adopt the SQL Server.
important role of troubleshooter when issues
arise—particularly if users of business-critical Lessons
applications that rely on SQL Server databases • Transferring Data to and from SQL
are being prevented from working. It is Server
important to have a solid methodology for • Importing and Exporting Table Data
resolving issues in general, and to be familiar • Using bcp and BULK INSERT to Import
with the most common issues that can arise Data
when working with SQL Server systems. • Deploying and Upgrading Data-Tier
Application
Lessons
• A Trouble Shooting Methodology for Lab : Importing and Exporting Data
SQL Server • Import and Excel Data Using the Import
• Resolving Service Related Issues Wizard
• Resolving Connectivity and Log-in • Import a Delimited Text File Using bcp
issues • Import a Delimited Text File using BULK
INSERT
Lab : Troubleshooting Common Issues • Create and Test an SSIS Package to
• Troubleshoot and Resolve a SQL Login Extract Data
Issue • Deploy a Data-Tier Application

20764A: Administering a SQL Database Infrastructure


| Page 6 of 6
www.info-trek.com

You might also like