55353AC Administering a SQL Database Infrastructure

€695.00
| /

________________________________________________________________

Do you want to take this course remotely or in person?

Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices

________________________________________________________________

Administering A SQL Database Infrastructure Course - M55353A

This course provides students who administer and maintain SQL Server databases with the knowledge and skills to manage a SQL Server database infrastructure.

Additionally, it will be useful for people developing applications that deliver content from SQL Server databases.

SQL Database Course Duration
SQL Database Training
Virtual classroom training SQL Database
Administering A SQL Database Infrastructure

Official SQL Server Course - Database Administration - Enterprise Data Infrastructure - SQL Security and Recovery - SQL Task Automation - Advanced SQL Server Administration

Addressed to

The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of ​​responsibility, or work in environments where databases play a key role in their primary work.

The secondary audiences for this course are people who develop applications that deliver content from SQL Server databases.

Training objectives

  • Authenticate and authorize users
  • Assign server and database roles
  • Authorize users to access resources
  • Protect data with encryption and auditing
  • Describe recovery models and backup strategies.
  • Backing up SQL Server databases
  • Restore SQL Server databases
  • Automate database management
  • Configure security for the SQL Server agent
  • Manage alerts and notifications
  • Manage SQL Server using PowerShell
  • Tracking access to SQL Server
  • Monitoring a SQL Server Infrastructure
  • Troubleshooting a SQL Server infrastructure
    Import and export data


Course Content: Administering a SQL Database Infrastructure

Module 1: SQL Server Security

Securing data within your Microsoft SQL Server databases is essential and requires a working knowledge of SQL Server security issues and features. This module describes security models, logins, users, partially contained databases, and authorization between SQL Server servers.

Lessons

  • Authentication of connections to SQL Server
  • Authorizing logins to connect to databases
  • Authorization between servers
  • Partially contained databases

Lab 1: User Authentication

  • Create logins
  • Create database users
  • Fix app login issues
  • Configure security for restored databases

After completing this module, students will be able to:

  • SQL Server Basics.
  • SQL Server Connection Authentication.
  • User login authorization to databases.
  • Partially contained databases.
  • Authorization between servers.

Module 2: Assigning Server and Database Roles

Using roles simplifies managing user permissions. With roles, you can control authenticated users' access to system resources based on each user's job function; instead of assigning permissions on a per-user basis, you can grant permissions to a role and then make users members of roles. Microsoft SQL Server includes support for security roles defined at both the server and database levels.

Lessons

  • Working with server roles
  • Working with Fixed Database Roles
  • Assigning user-defined database roles

Lab 1: Assigning Server and Database Roles

  • Assigning server roles
  • Assigning Fixed Database Roles
  • Assigning user-defined database roles
  • Security check

After completing this module, students will be able to:

  • Describe and use server roles to manage server-level security.
  • Describe and use fixed database roles.
  • Use custom database roles and application roles to manage database-level security.

Module 3: Authorizing users to access resources

In the previous modules, you saw how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database levels using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is authorizing users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users can execute code, such as functions and stored procedures. In many cases, these permissions and permissions on database objects are best configured at the schema level rather than at the individual object level. Schema-based permission grants can simplify your security architecture. You will explore schema-level permission grants in the final lesson of this module.

Lessons

  • Describe and use server roles to manage server-level security.
  • Describe and use fixed database roles.
  • Use custom database roles and application roles to manage database-level security.

Lab 1: Authorizing Users to Access Resources

  • Describe and use server roles to manage server-level security.
  • Describe and use fixed database roles.
  • Use custom database roles and application roles to manage database-level security.

After completing this module, students will be able to:

  • Describe and use server roles to manage server-level security.
  • Describe and use fixed database roles.
  • Use custom database roles and application roles to manage database-level security.

Module 4: Data Protection with Encryption and Auditing

When configuring the security of your Microsoft SQL Server systems, you must ensure that you meet all of your organization's compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a variety of options for implementing auditing. Another common compliance requirement is data encryption to protect against unauthorized access in the event that database file access is compromised. SQL Server supports this requirement by providing Transparent Data Encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data, such as credit card numbers or national identity numbers, can be encrypted using the Always Encrypted feature. This module describes the options available for auditing in SQL Server, how to use and manage the SQL Server auditing feature, and how to implement encryption.

  • Options for auditing data access in SQL Server
  • Implementing SQL Server Auditing
  • Manage SQL Server Auditing
  • Data protection with encryption

Lab 1: Using Auditing and Encryption

  • Working with SQL Server Auditing
  • Encrypt a column as usual encrypted
  • Encrypt a database using TDE

After completing this module, students will be able to:

  • Describe options for auditing data access.
  • Implement SQL Server Auditing.
  • Manage SQL Server auditing.
  • Describe and implement data encryption methods in SQL Server.
  • Implement encryption

Module 5: Recovery Models and Backup Strategies

One of the most important aspects of a database administrator's role is ensuring that the organization's data is reliably backed up so that, if a failure occurs, the data can be recovered. Despite the fact that the computing industry has known about the need for reliable backup strategies for decades and has discussed this extensively, unfortunate stories related to data loss are still common. Another problem is that, even when implemented strategies work as designed, the results still fall short of an organization's operational requirements. In this module, you will consider how to create a strategy that is aligned with the organization's needs, based on available backup models and the role of transaction logs in maintaining database consistency.

Lessons

  • Understanding backup strategies
  • SQL Server Transaction Logs
  • Planning backup strategies

Lab 1: Understanding SQL Server Recovery Models

  • Plan a backup strategy
  • Configure database recovery models

After completing this module, students will be able to:

  • Describe various backup strategies.
  • Describe how database transaction logs work.
  • Plan SQL Server backup strategies.

Module 6: Backing Up SQL Server Databases

In the previous module, you learned how to plan a backup strategy for a SQL Server system. Now you can learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.

Lessons

  • Backup of databases and transaction logs
  • Managing database backups
  • Advanced Database Options

Lab 1: Backing Up Databases

  • Database backup
  • Backing up databases, differentials, and transaction logs
  • Performing a partial backup

After completing this module, students will be able to:

  • Back up SQL Server databases and transaction logs.
  • Manage database backups.
  • Describe advanced backup options.

Module 7: Restoring SQL Server Databases

In the previous module, you learned how to create backups of Microsoft SQL Server databases. A backup strategy can involve many different types of backups, so it's essential that you can restore them effectively. You'll often restore a database in an urgent situation. However, you need to make sure you have a clear plan for how to proceed and successfully recover the database to the required state. A good plan and understanding of the restoration process can help prevent the situation from worsening. Some database restorations are related to system failures. In these cases, you'll want to return the system as close as possible to the state it was in before the failure. However, some failures are related to human error, and you may want to recover the system to a point before that failure. SQL Server's point-in-time recovery features can help you achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care must be taken when recovering them. In particular, you must understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore system and user databases and how to implement point-in-time recovery. You must understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore system and user databases and how to implement point-in-time recovery. You must understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore system and user databases and how to implement point-in-time recovery.

Lessons

  • Understanding the restoration process
  • Database restoration
  • Advanced restoration scenarios
  • Point-in-time recovery

Lab 1: Restoring SQL Server Databases

  • Restore a database backup
  • Restricting backups of databases, differentials, and transaction logs
  • Carrying out a restoration in parts

After completing this module, students will be able to:

  • Explain the restoration process.
  • Restore databases.
  • Perform advanced restore operations.
  • Perform a point-in-time recovery.

Module 8: Automating SQL Server Administration

The tools provided by Microsoft SQL Server make administration easier than other database engines. However, even when tasks are easy to perform, it is common to have to repeat a task many times. Effective database administrators learn to automate repetitive tasks. This can help avoid situations in which an administrator forgets to run a task at the required time. Perhaps most importantly, automating tasks helps ensure that they are performed consistently every time they are run. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multi-server jobs.

Lessons

  • Automating SQL Server Administration
  • Working with SQL Server Agent
  • Managing SQL Server Agent Jobs
  • Multi-server management

Lab 1: Automating SQL Server Administration

  • Create a SQL Server Agent Job
  • Try a job
  • schedule a job
  • Configure master and target servers

After completing this module, students will be able to:

  • Describe methods to automate SQL Server administration.
  • Configure jobs, job step types, and schedules.
  • Manage SQL Server Agent jobs.
  • Configure master and target servers.

Module 9: Configuring Security for SQL Server Agent

Other modules in this course have demonstrated the need to minimize the permissions granted to users, following the principle of “least privilege.” This means that users only have the permissions they need to perform their tasks. The same logic applies to granting permissions to SQL Server Agent. Although it is easy to run all jobs in the context of the SQL Server Agent service account and configure that account as an administrative account, this would create a poor security environment. It is important to understand how to create a least-privilege security environment for jobs running on SQL Server Agent.

Lessons

  • SQL Server Agent Security Overview
  • Credentials Configuration
  • Setting up proxy accounts

Lab 1: Configuring Security for SQL Server Agent

  • Analyzing Problems in SQL Server Agent
  • Setting up a credential
  • Setting up a proxy account
  • Setting and testing a job's security context

After completing this module, students will be able to:

  • Explain SQL Server Agent security.
  • Configure credentials.
  • Configure proxy accounts

Module 10: Monitoring SQL Server with Alerts and Notifications

A key aspect of proactively managing Microsoft SQL Server is ensuring you are aware of problems and events occurring on the server as they happen. SQL Server logs a wealth of information about problems. You can configure it to automatically notify you when these problems occur, using alerts and notifications. The most common way SQL Server database administrators receive details of events of interest is through an email message. This module covers configuring database email, alerts, and notifications for a SQL Server instance and configuring alerts for Microsoft Azure SQL Database.

Lessons

  • SQL Server Error Monitoring
  • Configuring database mail
  • Operators, alerts and notifications
  • Alerts in Azure SQL Database

Lab 1: Monitoring SQL Server with Alerts and Notifications

  • Configuring database mail
  • Operator Configuration
  • Setting up alerts and notifications
  • Testing alerts and notifications

After completing this module, students will be able to:

  • Monitor SQL Server errors.
  • Configure database mail.
  • Configure operators, alerts, and notifications.
  • Working with alerts in Azure SQL Database.

Module 11: Introduction to SQL Server Administration Using PowerShell

This module examines how to use Windows PowerShell with Microsoft SQL Server. Businesses constantly need to increase the efficiency and reliability of their IT infrastructure maintenance; with PowerShell, you can improve this efficiency and reliability by creating scripts to perform tasks. PowerShell scripts can be tested and applied multiple times to multiple servers, saving your organization time and money.

Lessons

  • Getting Started with Windows PowerShell
  • Configure SQL Server using PowerShell
  • Manage and maintain SQL Server with PowerShell
  • Managing Azure SQL Databases Using PowerShell

Lab 1: Using PowerShell to Manage SQL Server

  • Getting Started with PowerShell
  • Using PowerShell to Change SQL Server Settings

After completing this module, students will be able to:

  • Describe the benefits of PowerShell and its fundamental concepts.
  • Configure SQL Server using PowerShell.
  • Manage and maintain SQL Server using PowerShell.
  • Manage an Azure SQL database using PowerShell.

Module 12: Tracing SQL Server Access with Extended Events

Monitoring performance metrics provides an excellent way to assess the overall performance of a database solution. However, there are times when you need to perform a more detailed analysis of the activity occurring within a Microsoft SQL Server instance to troubleshoot issues and identify ways to optimize workload performance. SQL Server Extended Events is a lightweight and flexible event management system built into the Microsoft SQL Server database engine. This module focuses on the architectural concepts, troubleshooting strategies, and usage scenarios of Extended Events.

Lessons

  • Extended Event Basics
  • Working with extended events

Lab 1: Extended Events
Using the System_Health Extended Event Session
Tracking page splits using extended events

After completing this module, students will be able to:

  • Describe the basic concepts of extended events.
  • Create and view extended event sessions.

Module 13: SQL Server Monitoring

The Microsoft SQL Server database engine can run for extended periods without requiring administrative attention. However, by regularly monitoring the activity occurring on the database server, you can troubleshoot potential problems before they arise. SQL Server provides several tools you can use to monitor current activity and record details of past activity. You should familiarize yourself with what each tool does and how to use them. It's easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analyzing their output.

Lessons

  • Activity monitoring
  • Capturing and managing performance data
  • Analysis of collected performance data
  • SQL Server Utility

Lab 1: Monitoring SQL Server

  • Monitor current activity.
  • Capture and manage performance data.
  • Analyze collected performance data.
  • Configure the SQL Server utility.

After completing this module, students will be able to:

Activity monitoring

  • Capture and manage performance data
  • Analyze collected performance data
  • Use the SQL Server utility

Module 14: Troubleshooting SQL Server

Database administrators working with Microsoft SQL Server must take on the important role of troubleshooting when problems arise, especially if users of business-critical applications that depend on SQL Server databases are unable to work. It's important to have a solid methodology for general troubleshooting and to be familiar with the most common issues that can arise when working with SQL Server systems.

Lessons

  • A troubleshooting methodology for SQL Server
  • Troubleshooting service-related issues
  • Troubleshooting connectivity and login issues

Lab 1: Troubleshooting Common Problems

  • Troubleshoot and resolve a SQL login issue
  • Troubleshoot and resolve a service issue
  • Troubleshoot and resolve a Windows logon problem
  • Troubleshoot and resolve a job execution issue
  • Troubleshoot and resolve a performance issue

After completing this module, students will be able to:

  • Describe a troubleshooting methodology for SQL Server.
  • Resolve service-related issues.
  • Troubleshoot login and connectivity issues.

Module 15: Importing and Exporting Data

While users running application programs directly input a large amount of data residing in a Microsoft SQL Server system, there is often a need to move data from other locations to and from SQL Server. SQL Server provides a set of tools that you can use to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) utility and SQL Server Integration Services, are external to the database engine. Other tools, such as the BULK INSERT statement and the OPENROWSET function, are implemented in the database engine. With SQL Server, you can also create data-tier applications that package all the tables, views, and instance objects associated with a user database into a single deployment unit. In this module, you will explore these tools and techniques so you can import and export data to and from SQL Server.

Lessons

  • Transferring data to and from SQL Server
  • Importing and exporting table data
  • Using bcp and BULK INSERT to import data
  • Implementing and Updating the Data Tier Application

Lab 1: Importing and Exporting Data

  • Importing Excel data with the Import Wizard
  • Import a delimited text file using bcp
  • Import a delimited text file using BULK INSERT
  • Create and test an SSIS package to extract data
  • Implement a data tier application

After completing this module, students will be able to:

  • Importing Excel data with the Import Wizard
  • Import a delimited text file using bcp
  • Import a delimited text file using BULK INSERT
  • Create and test an SSIS package to extract data
  • Implement a data tier application


    Prerequisites

    In addition to their professional experience, students completing this training must already have the following technical knowledge:

    • Basic knowledge of the Microsoft Windows operating system and its main functionality.
    • Working knowledge of Transact-SQL.
    • Practical knowledge of relational databases.
    • Some experience with database design.


    Language

    • Course: English

    • Labs: English

    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Always by your side

    Modalidades Formativas

    Do you need another training modality?

    Self Learning - Virtual - In-person - Telepresence

    bonificaciones

    Bonuses for companies

    For companies