Post Description
When you complete this CBT course, you'll be an expert on the following "must-know" 70-432 skills:
Chapter 1: Installation Considerations
.Installation Options
.Books Online
.SQL Server Editions
.CPU Requirements
.File Locations
.File Structure
.Optimizing Tempdb
.SQL Service Accounts
.Special Considerations
Chapter 2: Installing SQL Server
.SQL Server Installation Center
.Installation Features
.Configuring Service Accounts
.Report Service Options
Chapter 3: Configuring SQL Server Instance
.Memory Considerations
.Affinity Mask
.Management Studio
.Instance Configuration
.SP Configuration
.Configuration Parameters
Chapter 4: Configuring Services
.SQL Server Browser
.Configuration Manager
.Service Properties
.Network Configuration
.Client Configuration
Chapter 5: SQL Server Components
.SQL Server Integration Services
.SQL Server Analysis Services
.SQL Server Reporting Services
.Configure Replication
.Replication Security
.Reporting Services Configuration Manager
.E-mail Settings for SSRS
.Configuring Distribution
.Distribution Settings
Chapter 6: Configuring Database Mail
.Database E-mail
.Profiles and Accounts
.Database Mail Setup
.SMTP Server Name
.Manage Profiles
.Database Mail Configuration
Chapter 7: Full-Text Indexing
.Full-Text Overview
.Full-Text Indexes
.Enabling Indexing
.Catalog Properties
.Configuring Full-Text Indexes
.Creating a Full-Text Index
.Full-Text Indexing Homework
Chapter 8: SQL Agent Operators
.SQL Agent Properties
.Creating an Operator
.Pager Notifications
.Operator Notifications
.Fail-Safe Operator
Chapter 9: SQL Agent Jobs
.Creating New Job
.Job Categories
.Job Steps and Types
.Step Advanced Options
.Job Schedules
.Alerts and Notifications
.Target Servers
.Security Roles
.SQL Agent Job Security
.Creating a Credential
.Creating a Proxy
Chapter 10: SQL Agent Alerts
.Alert Overview
.New Alert
.Alert Response
.Firing the Alert
.Performance Alerts
.WMI Alerts
.Creating WMI Alert
Chapter 11: Declarative Management Framework
.Policy-Based Management
.Facets
.New Condition
.New Policy
.Evaluate Policy
.Naming Condition
.Naming Policy
.Evaluate Naming Policy
.Managing Policy Categories
Chapter 12: Backing Up
.Backup Concepts
.Windows Server Backup
.Backup Schedule
Chapter 13: SQL Security Considerations
.Surface Area Security
.sp_configure Options
.Authentication Modes
.SQL Server Authentication
.Trusted Security
.Password Complexity
.Password Expiration
Chapter 14: Managing SQL Logins
.Managing SQL Security
.Creating Login in T-SQL
.Working with Logins
.System Login Tokens
.Using LOGINPROPERTY
.Fixed Server Roles
.Public Server Roles
.ServerPrincipal
Chapter 15: Managing SQL Instance Permissions
.Login Triggers
.Login Trigger Benefits
.Creating a Trigger
.Testing Trigger
.Ownership Chaining
.Fixed Roles vs. Permissions
Chapter 16: Auditing SQL Instances
.C2 Security
.C2 Considerations
.ICC for IT Security Evaluation
.Common Criteria
.Audit Login Failures
.DDL Triggers
.Using Triggers
.EVENTDATA Function
.Viewing Triggers
.Event Notifications
.Configuring Event Notifications
.Event Notification Processor
.Create Queue and Service
.Using Server Notifications
Chapter 17: Understanding Users and Roles
.Adding Database Users
.Special Users
.Database Roles
.Object Name Resolution
.Roles
.Application Roles
.Using Application Roles
Chapter 18: Managing Users and Roles
.Creating New User
.Create User with T-SQL
.Create Role with T-SQL
Chapter 19: Schema and Object Permissions
.Schemas
.Schemas Defined
.Chain of Ownership
.When Is Security Checked?
.Scenario One
.Scenario Two
.Scenario Three
.Configure Schema Permissions
.Create Schema and Tables
.Impersonation
.Change User Default Schema
.Impersonation Defined
.Cross DB Chaining
.Cross DB Chaining Problems
.Extending Impersonation
.Using Certificates to Impersonate
Chapter 20: Transparent Data Encryption
.Transparent Data Encryption Defined
.Backups
.Backing Up the Table
.Enable Database Encryption
.Backing Up Certificates
.Restoring Encrypted Databases
Chapter 21: Creating Databases
.Understanding Databases
.Transaction Log
.Database Creation Options
.Database Syntax
.Collation
.Sorting Data
.Comparing Data
.Automatic and Explicit Data Collation
Chapter 22: Manage and Configure Databases
.Transaction Log Rules
.Recovery Considerations
.Filegroup Introduction
.Understanding Filegroups
.New Database
.Options and Filegroups
.Recovery Models Defined
.Create Database Using T-SQL
.Adding Multiple Data Files
.Adding Multiple Filegroups
.Data File Location
.Detach/Attach Databases
.Detach Database Steps
.Attach a Database
Chapter 23: Understanding Backups
.Backup Methods
.Types of Backup
.Backup Permissions
.Backing Up to Disk
.Backing Up to Tape
.Backup - How Often?
.Full Backup
.Full Backup - When?
.Backup Options
.Tape Options
Chapter 24: Performing Full Backups
.Perform Backup
.Change Default Filegroup
.Backing Up to Default Directory
.Other Backup Types
.Striped Set Backups
.Same File Backups
Chapter 25: Restore Concepts
.Restore vs. Recovery
.Automatic Recovery
.Restore Types
.Restore Process
.What Is On the Media?
.RESTORE VERIFYONLY
.RESTORE FILELISTONLY
.RESTORE LABELONLY and HEADERONLY
Chapter 26: Restoring Full Backups
.Restore Steps
.Restore Command
.Restore Options
.Simple Restore
.Manual Recovery
.Restore Mirrors and Striped Sets
.Restore Change Name
.Restore Compressed Backup
Chapter 27: Performing Transaction Log Backups
.Transaction Log Backup
.Normal Log Backup
.Backup Log Options
.Full Log Considerations
.Running Transaction Log Backup
Chapter 28: Restoring Transaction Log Backups
.Log Restore Process
.Understanding Backup NO_TRUNCATE
.Restore Setup
.Restore with Recovery
.Restoring with NORECOVERY
Chapter 29: Performing Differential Backups
.Understanding Differential Backups
.Monday Differential
.Sunday Differential
.Standard Scenario
.Differential Backup
Chapter 30: File and Filegroup Backups
.Overview
.Restoring Files and Filegroups
.Online Restore
.Backing Up Files and Filegroups
.File and Filegroup Backup Options
Chapter 31: Managing Database Snapshots
.Snapshots Defined
.Snapshot Restrictions
.Snapshot Implementation
.Best Practices
.Create Snapshot
.Use Snapshot
.Update Snapshot
.DDL Changes
.Restoring From Snapshot
Chapter 32: Managing Database Integrity
.Integrity
.DBCC CHECKDB
.Suspect Pages
.Event Types
.Managing Integrity
Chapter 33: Maintenance Plans
.Understanding Database Maintenance
.Maintenance Tasks
.Reviewing Maintenance Plans
Chapter 34: Import and Export Data
.Relocating Data
.SELECT INTO
.Import/Export Wizard
.Using Import/Export Wizard
.Bulk Imports
.Bulk Copy
.BCP
.BCP Syntax
.Bulk Copy Demonstration
.BULK INSERT
.BULK INSERT Demonstration
.OPENROWSET
.OPENROWSET Demonstration
.OPENDATASOURCE Demonstration
Chapter 35: Manage Data Partitions
.Partitioned Tables
.Benefits
.Partition Table Candidates
.Partition Steps
.Partition Function
.Partition Scheme
.Partition Table Creation
.Alter Table Commands
.Merge/Split Partition
Chapter 36: Partitioning
.Create/Fill/Partition Database
.Create Partition Function
.Viewing Partitions and Row Counts
.Partition Range Values and Parameters
.Query Results
.Nonpartition Execution Plan
.Row Count Lookup
.Switch Partitions
Chapter 37: Data Compression
.Row and Page Compression
.Data Compression Demonstration
.Compressing the Data
.Enabling Compression
.Sparse Columns
.Using Sparse Columns
.Insert Using Column Set
.Updating Using Special Purpose Columns
Chapter 38: Understanding Indexes
.Indexing Pros and Cons
.What Indexes Affect
.Seek vs. Scan
.Using Table Scan
.Data Access and Usefulness
.Data Access without Index
.Data Access with Index
Chapter 39: Index Structures
.Indexes and Data Storage
.Heap Storage
.Clustered Indexes
.Nonclustered Indexes
.Nonclustered Index Example
.Nonclustered
Chapter 40: Creating Indexes
.How Indexes Are Created
.Create Index Command
.Creating an Index Process
.Creating an Index
.sort_in_tempdb Command
.ignore_dup_key Command
.drop_existing Command
.MAXDOP and Locking Commands
.INCLUDE Command
.Drop Index Command
.Multi_Columned Indexes
.Partitioned Index
.Computed Column Index
Chapter 41: Index Options and Metadata
.Create Index Demonstration
.Ignore Duplicate Key Values
.Using Covering Index
.Getting Index Information
.XML/Physical Statistics
.Getting Locking Information
.DM DB Index Usage Statistics
Chapter 42: Index Fragmentation
.Understanding Index Fragmentation
.Fixing Fragmentation
.Page Fullness
.Empty Pages
.External Fragmentation
.Pages Too Full
Comments # 0