<< WIN PrepLogic - 70-432 - SQL Server 2008 Implementation and Maintenance
PrepLogic - 70-432 - SQL Server 2008 Implementation and Maintenance
Category Applications
PlatformWindows
GenreEducational
Date 1 decade, 2 years
Size 2.67 GB
 
Website http://www.learnsmartsystems.com/products/video/video-training-details.aspx?eid=871
 
Sender thesmarty (A7B5vA)                
Tag ComputerTraining        
 
Searchengine Search
NZB NZB
 
Number of spamreports 1

Post Description

When you complete this CBT course, you'll be an expert on the following "must-know" 70-432 skills:

Chapter 1: Installation Considerations
.Installation Options
.Books Online
.SQL Server Editions
.CPU Requirements
.File Locations
.File Structure
.Optimizing Tempdb
.SQL Service Accounts
.Special Considerations

Chapter 2: Installing SQL Server
.SQL Server Installation Center
.Installation Features
.Configuring Service Accounts
.Report Service Options

Chapter 3: Configuring SQL Server Instance
.Memory Considerations
.Affinity Mask
.Management Studio
.Instance Configuration
.SP Configuration
.Configuration Parameters

Chapter 4: Configuring Services
.SQL Server Browser
.Configuration Manager
.Service Properties
.Network Configuration
.Client Configuration

Chapter 5: SQL Server Components
.SQL Server Integration Services
.SQL Server Analysis Services
.SQL Server Reporting Services
.Configure Replication
.Replication Security
.Reporting Services Configuration Manager
.E-mail Settings for SSRS
.Configuring Distribution
.Distribution Settings

Chapter 6: Configuring Database Mail
.Database E-mail
.Profiles and Accounts
.Database Mail Setup
.SMTP Server Name
.Manage Profiles
.Database Mail Configuration

Chapter 7: Full-Text Indexing
.Full-Text Overview
.Full-Text Indexes
.Enabling Indexing
.Catalog Properties
.Configuring Full-Text Indexes
.Creating a Full-Text Index
.Full-Text Indexing Homework

Chapter 8: SQL Agent Operators
.SQL Agent Properties
.Creating an Operator
.Pager Notifications
.Operator Notifications
.Fail-Safe Operator

Chapter 9: SQL Agent Jobs
.Creating New Job
.Job Categories
.Job Steps and Types
.Step Advanced Options
.Job Schedules
.Alerts and Notifications
.Target Servers
.Security Roles
.SQL Agent Job Security
.Creating a Credential
.Creating a Proxy

Chapter 10: SQL Agent Alerts
.Alert Overview
.New Alert
.Alert Response
.Firing the Alert
.Performance Alerts
.WMI Alerts
.Creating WMI Alert

Chapter 11: Declarative Management Framework
.Policy-Based Management
.Facets
.New Condition
.New Policy
.Evaluate Policy
.Naming Condition
.Naming Policy
.Evaluate Naming Policy
.Managing Policy Categories

Chapter 12: Backing Up
.Backup Concepts
.Windows Server Backup
.Backup Schedule

Chapter 13: SQL Security Considerations
.Surface Area Security
.sp_configure Options
.Authentication Modes
.SQL Server Authentication
.Trusted Security
.Password Complexity
.Password Expiration

Chapter 14: Managing SQL Logins
.Managing SQL Security
.Creating Login in T-SQL
.Working with Logins
.System Login Tokens
.Using LOGINPROPERTY
.Fixed Server Roles
.Public Server Roles
.ServerPrincipal

Chapter 15: Managing SQL Instance Permissions
.Login Triggers
.Login Trigger Benefits
.Creating a Trigger
.Testing Trigger
.Ownership Chaining
.Fixed Roles vs. Permissions

Chapter 16: Auditing SQL Instances
.C2 Security
.C2 Considerations
.ICC for IT Security Evaluation
.Common Criteria
.Audit Login Failures
.DDL Triggers
.Using Triggers
.EVENTDATA Function
.Viewing Triggers
.Event Notifications
.Configuring Event Notifications
.Event Notification Processor
.Create Queue and Service
.Using Server Notifications

Chapter 17: Understanding Users and Roles
.Adding Database Users
.Special Users
.Database Roles
.Object Name Resolution
.Roles
.Application Roles
.Using Application Roles

Chapter 18: Managing Users and Roles
.Creating New User
.Create User with T-SQL
.Create Role with T-SQL

Chapter 19: Schema and Object Permissions
.Schemas
.Schemas Defined
.Chain of Ownership
.When Is Security Checked?
.Scenario One
.Scenario Two
.Scenario Three
.Configure Schema Permissions
.Create Schema and Tables
.Impersonation
.Change User Default Schema
.Impersonation Defined
.Cross DB Chaining
.Cross DB Chaining Problems
.Extending Impersonation
.Using Certificates to Impersonate

Chapter 20: Transparent Data Encryption
.Transparent Data Encryption Defined
.Backups
.Backing Up the Table
.Enable Database Encryption
.Backing Up Certificates
.Restoring Encrypted Databases

Chapter 21: Creating Databases
.Understanding Databases
.Transaction Log
.Database Creation Options
.Database Syntax
.Collation
.Sorting Data
.Comparing Data
.Automatic and Explicit Data Collation

Chapter 22: Manage and Configure Databases
.Transaction Log Rules
.Recovery Considerations
.Filegroup Introduction
.Understanding Filegroups
.New Database
.Options and Filegroups
.Recovery Models Defined
.Create Database Using T-SQL
.Adding Multiple Data Files
.Adding Multiple Filegroups
.Data File Location
.Detach/Attach Databases
.Detach Database Steps
.Attach a Database

Chapter 23: Understanding Backups
.Backup Methods
.Types of Backup
.Backup Permissions
.Backing Up to Disk
.Backing Up to Tape
.Backup - How Often?
.Full Backup
.Full Backup - When?
.Backup Options
.Tape Options

Chapter 24: Performing Full Backups
.Perform Backup
.Change Default Filegroup
.Backing Up to Default Directory
.Other Backup Types
.Striped Set Backups
.Same File Backups

Chapter 25: Restore Concepts
.Restore vs. Recovery
.Automatic Recovery
.Restore Types
.Restore Process
.What Is On the Media?
.RESTORE VERIFYONLY
.RESTORE FILELISTONLY
.RESTORE LABELONLY and HEADERONLY

Chapter 26: Restoring Full Backups
.Restore Steps
.Restore Command
.Restore Options
.Simple Restore
.Manual Recovery
.Restore Mirrors and Striped Sets
.Restore Change Name
.Restore Compressed Backup

Chapter 27: Performing Transaction Log Backups
.Transaction Log Backup
.Normal Log Backup
.Backup Log Options
.Full Log Considerations
.Running Transaction Log Backup

Chapter 28: Restoring Transaction Log Backups
.Log Restore Process
.Understanding Backup NO_TRUNCATE
.Restore Setup
.Restore with Recovery
.Restoring with NORECOVERY

Chapter 29: Performing Differential Backups
.Understanding Differential Backups
.Monday Differential
.Sunday Differential
.Standard Scenario
.Differential Backup

Chapter 30: File and Filegroup Backups
.Overview
.Restoring Files and Filegroups
.Online Restore
.Backing Up Files and Filegroups
.File and Filegroup Backup Options

Chapter 31: Managing Database Snapshots
.Snapshots Defined
.Snapshot Restrictions
.Snapshot Implementation
.Best Practices
.Create Snapshot
.Use Snapshot
.Update Snapshot
.DDL Changes
.Restoring From Snapshot

Chapter 32: Managing Database Integrity
.Integrity
.DBCC CHECKDB
.Suspect Pages
.Event Types
.Managing Integrity

Chapter 33: Maintenance Plans
.Understanding Database Maintenance
.Maintenance Tasks
.Reviewing Maintenance Plans

Chapter 34: Import and Export Data
.Relocating Data
.SELECT INTO
.Import/Export Wizard
.Using Import/Export Wizard
.Bulk Imports
.Bulk Copy
.BCP
.BCP Syntax
.Bulk Copy Demonstration
.BULK INSERT
.BULK INSERT Demonstration
.OPENROWSET
.OPENROWSET Demonstration
.OPENDATASOURCE Demonstration

Chapter 35: Manage Data Partitions
.Partitioned Tables
.Benefits
.Partition Table Candidates
.Partition Steps
.Partition Function
.Partition Scheme
.Partition Table Creation
.Alter Table Commands
.Merge/Split Partition

Chapter 36: Partitioning
.Create/Fill/Partition Database
.Create Partition Function
.Viewing Partitions and Row Counts
.Partition Range Values and Parameters
.Query Results
.Nonpartition Execution Plan
.Row Count Lookup
.Switch Partitions

Chapter 37: Data Compression
.Row and Page Compression
.Data Compression Demonstration
.Compressing the Data
.Enabling Compression
.Sparse Columns
.Using Sparse Columns
.Insert Using Column Set
.Updating Using Special Purpose Columns

Chapter 38: Understanding Indexes
.Indexing Pros and Cons
.What Indexes Affect
.Seek vs. Scan
.Using Table Scan
.Data Access and Usefulness
.Data Access without Index
.Data Access with Index

Chapter 39: Index Structures
.Indexes and Data Storage
.Heap Storage
.Clustered Indexes
.Nonclustered Indexes
.Nonclustered Index Example
.Nonclustered

Chapter 40: Creating Indexes
.How Indexes Are Created
.Create Index Command
.Creating an Index Process
.Creating an Index
.sort_in_tempdb Command
.ignore_dup_key Command
.drop_existing Command
.MAXDOP and Locking Commands
.INCLUDE Command
.Drop Index Command
.Multi_Columned Indexes
.Partitioned Index
.Computed Column Index

Chapter 41: Index Options and Metadata
.Create Index Demonstration
.Ignore Duplicate Key Values
.Using Covering Index
.Getting Index Information
.XML/Physical Statistics
.Getting Locking Information
.DM DB Index Usage Statistics

Chapter 42: Index Fragmentation
.Understanding Index Fragmentation
.Fixing Fragmentation
.Page Fullness
.Empty Pages
.External Fragmentation
.Pages Too Full

Comments # 0