Die Hacking und Securing SQL Server Masterclass aus der ETC Lighthouse Series!
In this workshop you will analyze, learn and practice critical tasks for implementing highly secure SQL Server infrastructure. We’ll start with identifying security needs regarding database servers and look at the most common attack types and use them on ‘out of the box’ installation. In simple words we will hack our systems!
Then we will discuss impact of system and network security on databases server. Next we will go through every layer of protection offered by SQL Server with lots of real life examples and hands on labs. At the end we will look at the monitoring and auditing our infrastructure to detect threats and react to them. Additionally we’ll play with security of other SQL Services and Azure SQL Databases. Our goal is to show and teach you how to protect your precious data in SQL Server environment and how database security mechanisms work.
The course has a form of intense workshop where we make a deep dive inside the SQL Server.
All exercises are based on SQL Server 2016 and Windows Server 2016.
After the course you will be able to test and secure your SQL Server infrastructure and have knowledge for these topics:
- Hacking SQL Server Infrastructure
- SQL Server security baseline concepts
- SQL Server Instance Security
- Managing Logins and Passwords
- Encryption in SQL Server
- Protecting database backups
- Monitoring and auditing
- Securing other SQL Server services
- SPECIAL! To get more practice we offer three extra weeks of labs online!
This course is a must-go for:
- Database administrators, infrastructure architects, security professionals, system engineers, advanced database developer, IT professionals, security consultants and other people responsible for implementing databases security.
To attend this training you should have
- good hands-on experience in administering Microsoft SQL Server infrastructure. At least 5 years in the field is recommended.
Hacking SQL Server Infrastructure
SQL Server security baseline concepts
- Discovering SQL Server instances
- SQL injection using men in the middle
- Capturing SQL credentials using men in the middle
- Decrypting SQL Logins passwords
- Gaining access to SQL Server on compromised Windows Server
SQL Server Instance security
- Defining security objectives
- Configuring service accounts
- Auditing database permissions
- Implementing physical protection
- Configuring firewall
- Securing client-server communication
Managing Logins and Passwords
- Limiting permissions
- Securing CLR
- Implementing protection for extended procedures
- Protecting linked servers (OPENROWSET)
- Securing by using policies
- Hiding instance metadata
Encryption in SQL Server
- Authentication options
- Implementing password policies
- Securing connection strings
- Customizing login / user authorization
Protecting database backups
- Key management
- Code and data encryption
- Managing certificates
- Transparent database encryption
- Encryption in HA and Disaster Recovery
Monitoring and auditing
- Securing backup files
- Setting backup file passwords and encryption
- Handling keys and certificate backups
- Security considerations while restoring to another SQL Server instance
Securing other SQL Server services
- Login auditing options
- Data access auditing
- Data Manipulation Language custom auditing
- Policy-based management
- Forensics case study
- SQL Server Agent
- SQL Server Analysis Services
- SQL Server Reporting Services
- Azure SQL Database