Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
MICROSOFT SQL SERVER 2005: ADMINISTRATOR
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Oracle training, SQL Server training, MS Access training, Powerbuilder training, Visual Foxpro training, DB2 training, Crystal Reports training, Sybase training, Cognos training and Datawarehousing training

SQL Training Overview

SQL Server 2005 includes a rich set of tools that go beyond the basics of querying and manipulating data. In this course, you’ll learn about the administrative features that are available in SQL Server. This course also examines other SQL Server 2005 essential application, support, and maintenance topics – features you can use for high-availability, stability, reliability, and scalability of databases. Other topics covered include understanding and implementing security, analyzing performance, automating administrative tasks, and disaster recovery.

SQL Training Audience:

Database administrators interested in gaining a more thorough knowledge of SQL Server 2005’s features.

SQL Training Prerequisites

A working knowledge of SQL Server 2000 or 2005, basic relational database concepts, XML, Transact-SQL, and networking and security concepts.


SQL Training Course duration

3 days

SQL Training Course outline

Understanding and Implementing Security

  • Security Overview
  • The Threats
  • SQL Server 2005 Security Design Philosophy
  • The Two Stages of Security
  • Authentication
  • Configuring SQL Server Security Settings
  • Windows Integrated Authentication
  • SQL Server Authentication
  • Authorization
  • Principals
  • Securable Objects
  • Permissions
  • Permission Types
  • Permission Statements
  • Granting Permissions
  • Roles, Permissions, and Schemas
  • Execution Context
  • Metadata Security
  • Data Encryption
  • Encryption Keys
  • Encrypting Data
  • Security Epilog
Analyzing and Tuning Performance
  • Evaluating Performance
  • Define Monitoring Goals
  • SQL Server Monitoring Tools
  • Monitoring with SQL Server Profiler
  • Profiler Terminology
  • Getting Started with the Profiler
  • Tuning Queries
  • How Join Types Affect Performance
  • Join Hints
  • Performance Issues with Joins and Subqueries
  • Avoid Cursors
  • Indexes and Partitions
  • What is an Index?
  • What is a Partition?
  • Using the Database Engine Tuning Advisor
  • Capturing a Workload
  • Analyzing the Workload
  • Providing an Indexing and Partition Recommendation
  • Understanding SQL Server Performance Problems
  • Slow Queries
  • CPU Bottlenecks
  • Memory Bottlenecks
  • Troubleshooting with Dynamic Management Views
Automating Administrative Tasks
  • SQL Server Agent
  • Starting Agent
  • Setting Agent Properties
  • Operators
  • Jobs
  • Alerts
  • Maintenance Plans
  • Maintenance Plan Wizard
  • Maintenance Plan Designer
  • SQL Management Objects (SMO)
  • SMO Object Model
  • Accessing and Managing a Server
Programming Replication
  • Overview of SQL Server Replication
  • Publishing Model
  • Replication Types
  • Agents and Metadata
  • Replication Programming Interfaces
  • Replication Stored Procedures
  • Replication Management Objects
  • Agent Executables and ActiveX Controls
  • Configuring Replication
  • Publishing Data
  • Generating Replication Scripts
  • Running the Sample Application
  • Creating Subscriptions
  • Synchronizing Data
  • Starting a Synchronization
  • Showing Synchronization Status
  • Subscription Status
  • Reinitializing a Subscription
Disaster Recovery
  • Planning a Backup Strategy
  • Your Business Needs and Capabilities
  • Considering Data Recovery Needs
  • Availability Demands
  • Data Usage
  • Size of Database(s)
  • Database Server Configuration
  • Disaster Recovery Testing
  • Recovery Time Consideration
  • Backing Up Databases
  • Backup Devices
  • Creating Backups
  • Recovery Models
  • Types of Backup
  • Scheduling Your Backups
  • Scheduling System Database Backups
  • Scheduling Simple Backups
  • Scheduling Full and Bulk-Logged Backups
  • Backing Up Related Databases
  • Verifying Backup Media
  • Using Checksums
  • Using RESTORE VERIFYONLY
  • Restoring Databases
  • Roll Forward Set
  • Restoring with the Simple Recovery Model
  • Restoring with Full/Bulk-Logged Recovery Models
  • Online Restore
  • Using Database Snapshots
  • Creating a Database Snapshot
  • Reverting to a Database Snapshot
  • Deleting a Database Snapshot
Failover Clustering
  • High Availability Overview
  • Levels of Availability and Downtime
  • Estimating Availability Requirements
  • SQL Server 2005 Failover Cluster
  • Preparing a Server Cluster
  • Hardware and Software Requirements
  • Special Considerations
  • Creating a New Cluster
  • Set Up Domain Service Accounts
  • Prepare Static IP Addresses
  • Configure Computer Servers
  • Prepare Shared Disks
  • Create the New Cluster Server
  • Configure the Cluster
  • Add the Distributed Transaction Coordinator
  • Installing SQL Server 2005 Failover
  • What to Expect
  • Before Installing SQL Server Cluster
  • Running SQL Server Setup
  • System Configuration Checks
  • After Installing SQL Server
  • Adding SQL Server Nodes
  • Add a New Node to the Cluster
  • Add a Node to the SQL Server Virtual Server Cluster
  • Remove a SQL Server Virtual Server Node
Database Mirroring
  • Understanding Mirroring
  • How Mirroring Works
  • The Mirroring Session
  • Database Mirroring Operating Modes
  • Role Switching (Failover)
  • Other Mirroring Details
  • Database Mirroring Endpoints
  • Client-Side Redirection
  • Setting Up Database Mirroring
  • Prerequisites
  • Configuration Recommendations
  • Configuring the Recovery Model
  • Configuring Mirroring with SQL Server Management Studio and Transact-SQL
  • Configuring the Endpoints
  • Configuring the Operating Mode
  • Setting Up the Mirror Server Database
  • Backing Up the Principal
  • Restoring Full Backup on the Mirror
  • Restoring Transaction Log Backups on the Mirror
  • Starting the Mirroring Session
  • Working with a Mirror Session
  • Accessing Mirror Data with Snapshots
  • Monitoring Database Mirroring
  • Viewing the Mirror, Witness, and Endpoints
Log Shipping
  • Log Shipping Requirements
  • Security Requirements
  • Configuring Log Shipping
  • Transaction log Shipping Property Page
  • Configuring the Primary Database
  • Configuring the Secondary Database
  • Configuring the Monitor Server
  • Saving the Log Shipping Configuration
  • Removing Log Shipping
  • Monitoring Log Shipping Jobs
  • Viewing the Agent Job History
  • Transaction Log Shipping Status Report
  • Querying Log Shipping System Tables
  • Querying with Log Shipping Stored Procedure
  • Configuring Log Shipping in Transact-SQL
  • Configuring the Primary Database
  • Configuring the Primary Backup Job
  • Configuring the Secondary Database
  • Configuring the Secondary Copy Job
  • Configuring the Secondary Restore Job
  • Removing Log Shipping
Peer-to-Peer Replication
  • High-Availability
  • Requirements and Limitations
  • Protecting Data with Partitioning
  • Special Identity Columns Handling
  • Configuring Peer-to-Peer Replication
  • Security Planning
  • Configuring the Distributor
  • Configure Distribution Wizard
  • Adding a Publisher Server
  • Changing a Distributor’s Properties
  • Securing the Distributor
  • Creating the Distributor
  • Specify the Distributor
  • Publication Database
  • Publication Type
  • Articles
  • Filter Table Rows and Snapshot Agent
  • Agent Security
  • Wizard Action
  • Complete the Wizard
  • Creating Publication
  • Allowing Peer-to-Peer Subscriptions
  • Securing the Publisher
  • The Replication Monitor
  • Configuring Peer-to-Peer Subscribers
  • Initializing the Subscriber Database
  • Peer Distribution Preparation
  • Securing the Distributor
  • Configuring Peer-to-Peer Topology
  • Publication Specification
  • Peers
  • Log Reader Agent Security
  • Distribution Agent Security
  • New Peer Initialization
  • Completing the Wizard
  • Securing the Publisher
  • Configuring the PAL
  • Identity Columns
  • Adding a Node to an Existing Topology
  • Well-Connected Topology
Monitoring and Troubleshooting
  • Diagnosing and Resolving Database Server Errors
  • Using the Dedicated Administrator Connection (DAC)
  • SQL Server Error Logs
  • Error Messages in Event Logs
  • Setting Up Alerts in SQL Server Agent
  • Advantages of Using Alerts
  • Configuring the Alert
  • Monitoring SQL Server Agent Job History
  • Job Activity Monitor
  • Gathering Performance and Optimization Data using DMVs
  • DMV Permission Requirements
  • Inspecting a Server with DMVs
  • Troubleshooting Bottlenecks
  • Collecting Information Using DMVs
  • SQL Server 2005 Performance Dashboard Reports
  • DMVStats
Implementing Service Brokers
  • Understanding Service Brokers
  • Service Broker Advantages
  • Service Broker Application
  • Service Broker Messaging
  • Service Broker Uses
  • Designing Service Broker Applications
  • Message Types
  • Service Broker Activation
  • Transaction Life Cycle
  • Handling Errors
  • Handling Poison Messages
  • Service Broker Security
  • Programming Service Broker Applications
  • Enabling Service Broker
  • Creating Message Types
  • Creating Contracts
  • Creating the Queue
  • Creating the Service
  • Creating Routes
  • Creating Service Broker Endpoints
  • Implementing Applications

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved