20764B Administering A SQL Database Infrastructure
This five-day course teaches students how to administer and maintain SQL Server databases. It covers topics such as assigning database roles, authorizing user access, protecting data with encryption and auditing, backing up and restoring databases, and automating and monitoring database management. The target audience is database administrators and developers. The course uses lectures, demonstrations, and hands-on labs to help students learn how to configure security, back up databases, troubleshoot issues, and more for a SQL Server infrastructure.
20764B Administering A SQL Database Infrastructure
This five-day course teaches students how to administer and maintain SQL Server databases. It covers topics such as assigning database roles, authorizing user access, protecting data with encryption and auditing, backing up and restoring databases, and automating and monitoring database management. The target audience is database administrators and developers. The course uses lectures, demonstrations, and hands-on labs to help students learn how to configure security, back up databases, troubleshoot issues, and more for a SQL Server infrastructure.
20764B: ADMINISTERING A SQL • Authenticate and authorize users
DATABASE INFRASTRUCTURE • Assign server and database roles • Authorize users to access resources Course: 20764B; Duration: 5 Days; Instructor- • Protect data with encryption and led Classroom auditing • Describe recovery models and backup strategies WHAT YOU WILL LEARN • Backup SQL Server databases This five-day instructor-led course provides • Restore SQL Server databases students who administer and maintain SQL • Automate database management Server databases with the knowledge and • Configure security for the SQL Server agent skills to administer a SQL server database • Manage alerts and notifications infrastructure. Additional it will be of use to • Managing SQL Server using PowerShell individuals who develop applications that • Trace access to SQL Server deliver content from SQL Server databases. • Monitor a SQL Server infrastructure • Troubleshoot a SQL Server AUDIENCE infrastructure The primary audience for this course is • Import and export data individuals who administer and maintain SQL Server databases. These individuals perform COURSE OUTLINE database administration and maintenance as their primary area of responsibility, or work in Module 1: SQL Server Security environments where databases play a key role Protection of data within your Microsoft SQL in their primary job. Server databases is essential and requires a The secondary audiences for this course are working knowledge of the issues and SQL individuals who develop applications that Server security features. This module deliver content from SQL Server databases. describes SQL Server security models, logins, users, partially contained databases, and PREREQUISITES cross-server authorization. In addition to their professional experience, students who attend this training should Lessons • Authenticating Connections to SQL already have the following technical knowledge Server including basic knowledge of the Microsoft • Authorizing Logins to Connect to Windows operating system and its core databases functionality, working knowledge of Transact- • Authorization Across Servers SQL, working knowledge of relational • Partially Contained Databases databases and some experience with database Lab : Authenticating Users design. • Create Logins • Create Database Users METHODOLOGY • Correct Application Login Issues This program will be conducted with • Configure Security for Restored interactive lectures, PowerPoint presentations, Databases discussions and practical exercises After completing this module, you will be able COURSE OBJECTIVES to: Upon completion of this program, participants • SQL Server basic concepts. should be able to :
20764A: Administering a SQL Database Infrastructure
| Page 1 of 6 • SQL Server connection authentication. on the database objects are best configured at • User login authorization to databases. the schema level rather than at the level of the • Partially contained databases. individual object. Schema-based permission • Authorization across servers. grants can simplify your security architecture. You will explore the granting of permissions at Module 2: Assigning Server and Database the schema level in the final lesson of this Roles module. Using roles simplifies the management of user Lessons permissions. With roles, you can control • Authorizing User Access to Objects authenticated users’ access to system • Authorizing Users to Execute Code resources based on each user’s job function— • Configuring Permissions at the Schema rather than assigning permissions user-by- Level user, you can grant permissions to a role, then Lab : Authorizing users to access make users members of roles. Microsoft SQL resources Server includes support for security roles • Granting, Denying, and Revoking defined at server level and at database level. Permissions on Objects • Granting EXECUTE Permissions on Code Lessons • Granting Permissions at the Schema • Working with server roles Level • Working with Fixed Database Roles After completing this module, you will be able • Assigning User-Defined Database Roles to: • Authorize user access to objects. Lab : Assigning server and database roles • Authorize users to execute code. • Assigning Server Roles • Configure permissions at the schema • Assigning Fixed Database Roles level. • Assigning User-Defined Database Roles • Verifying Security Module 4: Protecting Data with Encryption and Auditing After completing this module, you will be able When configuring security for your Microsoft to: SQL Server systems, you should ensure that • Describe and use server roles to you meet any of your organization’s manage server-level security. compliance requirements for data protection. • Describe and use fixed database roles. Organizations often need to adhere to • Use custom database roles and industry-specific compliance policies, which application roles to manage database- mandate auditing of all data access. To level security. address this requirement, SQL Server provides a range of options for implementing auditing. Module 3: Authorizing Users to Access Another common compliance requirement is Resources the encryption of data to protect against In the previous modules, you have seen how unauthorized access in the event that access Microsoft SQL Server security is organized and to the database files is compromised. SQL how sets of permissions can be assigned at the Server supports this requirement by providing server and database level by using fixed transparent data encryption (TDE). To reduce server roles, user-defined server roles, fixed the risk of information leakage by users with database roles, and application roles. The final administrative access to a database, columns step in authorizing users to access SQL Server containing sensitive data—such as credit card resources is the authorization of users and numbers or national identity numbers—can be roles to access server and database objects. In encrypted using the Always Encrypted feature. this module, you will see how these object This module describes the available options for permissions are managed. In addition to auditing in SQL Server, how to use and access permissions on database objects, SQL manage the SQL Server Audit feature, and Server provides the ability to determine which how to implement encryption. users are allowed to execute code, such as stored procedures and functions. In many Lessons cases, these permissions and the permissions
20764A: Administering a SQL Database Infrastructure
| Page 2 of 6 www.info-trek.com • Options for auditing data access in SQL • Describe how database transaction logs Server function. • Implementing SQL Server Audit • Plan SQL Server backup strategies. • Managing SQL Server Audit • Protecting Data with Encryption Module 6: Backing Up SQL Server Databases Lab : Using Auditing and Encryption In the previous module, you learned how to • Working with SQL Server Audit plan a backup strategy for a SQL Server • Encrypt a Column as Always Encrypted system. You can now learn how to perform • Encrypt a Database using TDE SQL Server backups, including full and After completing this module, you will be able differential database backups, transaction log to: backups, and partial backups. In this module, • Describe the options for auditing data you will learn how to apply various backup access. strategies. • Implement SQL Server Audit. • Manage SQL Server Audit. Lessons • Describe and implement methods of • Backing Up Databases and Transaction encrypting data in SQL Server. Logs • Implement encryption • Managing Database Backups • Advanced Database Options Module 5: Recovery Models and Backup Strategies Lab : Backing Up Databases • Backing Up Databases One of the most important aspects of a • Performing Database, Differential, and database administrator's role is ensuring that Transaction Log Backups organizational data is reliably backed up so • Performing a Partial Backup that, if a failure occurs, you can recover the After completing this module, you will be able data. Even though the computing industry has to: known about the need for reliable backup • Perform backups of SQL Server strategies for decades—and discussed this at databases and transaction logs. great length—unfortunate stories regarding • Manage database backups. data loss are still commonplace. A further • Describe advanced backup options. problem is that, even when the strategies in place work as they were designed, the Module 7: Restoring SQL Server 2016 outcomes still regularly fail to meet an Databases organization’s operational requirements. In In the previous module, you learned how to this module, you will consider how to create a create backups of Microsoft SQL Server 2016 strategy that is aligned with organizational databases. A backup strategy might involve needs, based on the available backup models, many different types of backup, so it is and the role of the transaction logs in essential that you can effectively restore them. maintaining database consistency. You will often be restoring a database in an urgent situation. You must, however, ensure Lessons that you have a clear plan of how to proceed • Understanding Backup Strategies and successfully recover the database to the • SQL Server Transaction Logs required state. A good plan and understanding • Planning Backup Strategies of the restore process can help avoid making the situation worse. Some database restores Lab : Understanding SQL Server recovery are related to system failure. In these cases, models you will want to return the system as close as • Plan a Backup Strategy possible to the state it was in before the • Configure Database Recovery Models failure. Some failures, though, are related to After completing this module, you will be able human error and you might wish to recover to: the system to a point before that error. The • Describe various backup strategies. point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because
20764A: Administering a SQL Database Infrastructure
| Page 3 of 6 www.info-trek.com they are typically much larger, user databases are more likely to be affected by system Lab : Automating SQL Server Management failures than system databases. However, • Create a SQL Server Agent Job system databases can be affected by failures, • Test a Job and special care should be taken when • Schedule a Job recovering them. In particular, you need to • Configure Master and Target Servers understand how to recover each system After completing this module, you will be able database because you cannot use the same to: process for all system databases. In this • Describe methods for automating SQL module, you will see how to restore user and Server Management. system databases and how to implement • Configure jobs, job step types, and point-in-time recovery. schedules. • Manage SQL Server Agent jobs. Lessons • Configure master and target servers. • Understanding the Restore Process • Restoring Databases Module 9: Configuring Security for SQL • Advanced Restore Scenarios Server Agent • Point-in-Time Recovery Other modules in this course have demonstrated the need to minimize the Lab : Restoring SQL Server Databases permissions that are granted to users, • Restoring a Database Backup following the principle of “least privilege.” This • Restring Database, Differential, and means that users have only the permissions Transaction Log Backups that they need to perform their tasks. The • Performing a Piecemeal Restore same logic applies to the granting of After completing this module, you will be able permissions to SQL Server Agent. Although it to: is easy to execute all jobs in the context of the • Explain the restore process. SQL Server Agent service account, and to • Restore databases. configure that account as an administrative • Perform advanced restore operations. account, a poor security environment would • Perform a point-in-time recovery. result from doing this. It is important to understand how to create a minimal privilege Module 8: Automating SQL Server security environment for jobs that run in SQL Management Server Agent. The tools provided by Microsoft SQL Server make administration easy when compared to Lessons some other database engines. However, even • Understanding SQL Server Agent when tasks are easy to perform, it is common Security to have to repeat a task many times. Efficient • Configuring Credentials database administrators learn to automate • Configuring Proxy Accounts repetitive tasks. This can help to avoid situations where an administrator forgets to Lab : Configuring Security for SQL Server execute a task at the required time. Perhaps Agent more importantly, the automation of tasks • Analyzing Problems in SQL Server helps to ensure that they are performed Agent consistently, each time they are executed. This • Configuring a Credential module describes how to use SQL Server • Configuring a Proxy Account Agent to automate jobs, how to configure • Configuring and testing the Security security contexts for jobs, and how to Context of a Job implement multiserver jobs. After completing this module, you will be able to: Lessons • Explain SQL Server Agent security. • Automating SQL Server management • Configure credentials. • Working with SQL Server Agent • Configure proxy accounts. • Managing SQL Server Agent Jobs • Multi-server Management
20764A: Administering a SQL Database Infrastructure
| Page 4 of 6 www.info-trek.com Module 10: Monitoring SQL Server with • Configure SQL Server using PowerShell Alerts and Notifications • Administer and Maintain SQL Server One key aspect of managing Microsoft SQL with PowerShell Server in a proactive manner is to make sure • Managing Azure SQL Databases using you are aware of problems and events that PowerShell occur in the server, as they happen. SQL Server logs a wealth of information about Lab : Using PowerShell to Manage SQL issues. You can configure it to advise you Server automatically when these issues occur, by • Getting Started with PowerShell using alerts and notifications. The most • Using PowerShell to Change SQL Server common way that SQL Server database settings administrators receive details of events of After completing this module, you will be able interest is by email message. This module to: covers the configuration of Database Mail, • Describe the benefits of PowerShell and alerts, and notifications for a SQL Server its fundamental concepts. instance, and the configuration of alerts for • Configure SQL Server by using Microsoft Azure SQL Database PowerShell. • Administer and maintain SQL Server by Lessons using PowerShell. • Monitoring SQL Server Errors • Manage an Azure SQL Database by • Configuring Database Mail using PowerShell. • Operators, Alerts, and Notifications • Alerts in Azure SQL Database Module 12: Tracing Access to SQL Server with Extended events Lab : Monitoring SQL Server with Alerts Monitoring performance metrics provides a and Notifications great way to assess the overall performance of • Configuring Database Mail a database solution. However, there are • Configuring Operators occasions when you need to perform more • Configuring Alerts and Notifications detailed analysis of the activity occurring • Testing Alerts and Notifications within a Microsoft SQL Server instance—to After completing this module, you will be able troubleshoot problems and identify ways to to: optimize workload performance. SQL Server • Monitor SQL Server errors. Extended Events is a flexible, lightweight • Configure database mail. event-handling system built into the Microsoft • Configure operators, alerts, and SQL Server Database Engine. This module notifications. focuses on the architectural concepts, • Work with alerts in Azure SQL troubleshooting strategies and usage scenarios Database. of Extended Events.
Module 11: Introduction to Managing SQL Lessons
Server by using PowerShell • Extended Events Core Concepts This module looks at how to use Windows • Working with Extended Events PowerShell with Microsoft SQL Server. Businesses are constantly having to increase Lab : Extended Events the efficiency and reliability of maintaining • Using the System_Health Extended their IT infrastructure; with PowerShell, you Events Session can improve this efficiency and reliability by • Tracking Page Splits Using Extended creating scripts to carry out tasks. PowerShell Events scripts can be tested and applied multiple After completing this module, you will be able times to multiple servers, saving your to: organization both time and money. • Describe Extended Events core concepts. Lessons • Create and query Extended Events • Getting Started with Windows sessions. PowerShell
20764A: Administering a SQL Database Infrastructure
| Page 5 of 6 www.info-trek.com • Troubleshoot and Resolve a Service Module 13: Monitoring SQL Server Issue The Microsoft SQL Server Database Engine can • Troubleshoot and Resolve a Windows run for long periods without the need for Login Issue administrative attention. However, if you • Troubleshoot and Resolve a Job regularly monitor the activity that occurs on Execution Issue the database server, you can deal with • Troubleshoot and Resolve a potential issues before they arise. SQL Server Performance Issue provides a number of tools that you can use to After completing this module, you will be able monitor current activity and record details of to: previous activity. You need to become familiar • Describe a troubleshooting with what each of the tools does and how to methodology for SQL Server. use them. It is easy to become overwhelmed • Resolve service-related issues. by the volume of output that monitoring tools • Resolve login and connectivity issues. can provide, so you also need to learn techniques for analyzing their output. Module 15: Importing and Exporting Data While a great deal of data residing in a Lessons Microsoft SQL Server system is entered • Monitoring activity directly by users who are running application • Capturing and Managing Performance programs, there is often a need to move data Data in other locations, to and from SQL Server. • Analyzing Collected Performance Data SQL Server provides a set of tools you can use • SQL Server Utility to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) Lab : Monitoring SQL Server utility and SQL Server Integration Services, are external to the database engine. Other After completing this module, you will be able tools, such as the BULK INSERT statement and to: the OPENROWSET function, are implemented • Monitor current activity. in the database engine. With SQL Server, you • Capture and manage performance data. can also create data-tier applications that • Analyze collected performance data. package all the tables, views, and instance • Configure SQL Server Utility. objects associated with a user database into a single unit of deployment. In this module, you Module 14: Troubleshooting SQL Server will explore these tools and techniques so that Database administrators working with you can import and export data to and from Microsoft SQL Server need to adopt the SQL Server. important role of troubleshooter when issues arise—particularly if users of business-critical Lessons applications that rely on SQL Server databases • Transferring Data to and from SQL are being prevented from working. It is Server important to have a solid methodology for • Importing and Exporting Table Data resolving issues in general, and to be familiar • Using bcp and BULK INSERT to Import with the most common issues that can arise Data when working with SQL Server systems. • Deploying and Upgrading Data-Tier Application Lessons • A Trouble Shooting Methodology for Lab : Importing and Exporting Data SQL Server • Import and Excel Data Using the Import • Resolving Service Related Issues Wizard • Resolving Connectivity and Log-in • Import a Delimited Text File Using bcp issues • Import a Delimited Text File using BULK INSERT Lab : Troubleshooting Common Issues • Create and Test an SSIS Package to • Troubleshoot and Resolve a SQL Login Extract Data Issue • Deploy a Data-Tier Application
20764A: Administering a SQL Database Infrastructure