Masterclass: Hacking and Securing SQL Server [HSS]

Durée totale
Localisation
En ligne
Date et lieu de début

Masterclass: Hacking and Securing SQL Server [HSS]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

computer En ligne: VIRTUAL TRAINING CENTER
23 jan. 2023 jusqu'au 27 jan. 2023
computer En ligne: VIRTUAL TRAINING CENTER
29 mai 2023 jusqu'au 2 juin 2023

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

In this course you will analyze, learn and practice critical tasks for implementing highly secure SQL Server infrastructure. We’ll start with identifying security needs regarding database servers and look at the most common attack types and use them on ‘out of the box’ installation. In simple words we will hack our systems!

Then we will discuss impact of system and network security on databases server. Next we will go through every layer of protection offered by SQL Server with lots of real life examples and hands on labs. At the end we will look at the monitoring and auditing our infrastructure to detect threats and react to them. Additionally we’ll play with security of other SQL …

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Hacking, SQL, ISO 27001, Sécurité informatique et Cybersecurity.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

In this course you will analyze, learn and practice critical tasks for implementing highly secure SQL Server infrastructure. We’ll start with identifying security needs regarding database servers and look at the most common attack types and use them on ‘out of the box’ installation. In simple words we will hack our systems!

Then we will discuss impact of system and network security on databases server. Next we will go through every layer of protection offered by SQL Server with lots of real life examples and hands on labs. At the end we will look at the monitoring and auditing our infrastructure to detect threats and react to them. Additionally we’ll play with security of other SQL Services and Azure SQL Databases. Our goal is to show and teach you how to protect your precious data in SQL Server environment and how database security mechanisms work. After the course you will be able to test and secure your SQL Server infrastructure. And to get more practice we offer three extra weeks of labs online!

Delivered by a highly skilled SQL and database enthusiast with practical knowledge, multiple successful projects, many years of real-world experience. 

You should leave this class with scripts, checklists and practical, ready-to-use knowledge of how to hack, test and secure your SQL Server infrastructure.

The course runs as an intense workshop with a deep dive on  the SQL Server. All exercises are based on SQL Server 2016 and Windows Server 2016.

OBJECTIVES

After completing this courses you should be able to:

  • Hack, test and secure your SQL Server Infrastructure

AUDIENCE

Database administrators, infrastructure architects, security professionals, system engineers, advanced database developer, IT professionals, security consultants and other people responsible for implementing databases security.

CERTIFICATION

Recommended as preparation for the following exams:

  • No exams are currently aligned to this course

 

CONTENT

Module 1 Hacking SQL Server Infrastructure

  • Discovering SQL Server instances
  • SQL injection using men in the middle
  • Capturing SQL credentials using men in the middle
  • Decrypting SQL Logins passwords
  • Gaining access to SQL Server on compromised Windows Server

Module 2: SQL Server security baseline concepts

  • Defining security objectives
  • Configuring service accounts
  • Auditing database permissions
  • Implementing physical protection
  • Configuring firewall
  • Securing client-server communication

Module 3: SQL Server Instance security

  • Limiting permissions
  • Securing CLR
  • Implementing protection for extended procedures
  • Protecting linked servers (OPENROWSET)
  • Securing by using policies
  • Hiding instance metadata

Module 4: Managing Logins and Passwords

  • Authentication options
  • Implementing password policies
  • Securing connection strings
  • Customizing login / user authorization

Module 5: Encryption in SQL Server

  • Key management
  • Code and data encryption
  • Managing certificates
  • Transparent database encryption
  • Encryption in HA and Disaster Recovery

Module 6: Protecting database backups

  • Securing backup files
  • Setting backup file passwords and encryption
  • Handling keys and certificate backups
  • Security considerations while restoring to another SQL Server instance

Module 7: Monitoring and auditing

  • Login auditing options
  • Data access auditing
  • Data Manipulation Language custom auditing
  • Policy-based management
  • Forensics case study

Module 8: Securing other SQL Server services

  • SQL Server Agent
  • SQL Server Analysis Services
  • SQL Server Reporting Services
  • Azure SQL Database

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.