• 18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
  • 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337

20764: Administering a SQL Database Infrastructure Course Overiew

20764: Administering a SQL Database Infrastructure five-day educator drove course gives understudies who regulate and keep up SQL Server databases with the information and abilities to direct a SQL server database foundation. Furthermore, it will be useful to people who create applications that convey content from SQL Server databases. 

20764: Administering a SQL Database Infrastructure Audience Profile 

The essential crowd for this course is people who regulate and keep up SQL Server databases. These people perform database organization and upkeep as their essential range of obligation or work in conditions where databases assume a key part in their essential employment. 

The optional gatherings of people for 20764: Administering a SQL Database Infrastructure Course are people who create applications that convey content from SQL Server databases. 

20764: Administering a SQL Database Infrastructure At Course Completion

In the wake of finishing 20764: Administering a SQL Database Infrastructure Course, understudies will have the capacity to: 

  • Confirm and approve clients 
  • Allocate server and database parts 
  • Approve clients to get to assets 
  • Ensure information with encryption and reviewing 
  • Depict recuperation models and reinforcement systems 
  • Reinforcement SQL Server databases 
  • Reestablish SQL Server databases 
  • Computerize database administration 
  • Design security for the SQL Server operator 
  • Oversee cautions and warnings 
  • Overseeing SQL Server utilizing PowerShell 
  • Follow access to SQL Server 
  • Screen a SQL Server foundation 
  • Investigate a SQL Server foundation 
  • Import and fare information 


20764: Administering a SQL Database Infrastructure Course Outline

Module 1: SQL Server Security 

Assurance of information inside your Microsoft SQL Server databases is fundamental and requires working learning of the issues and SQL Server security highlights. This module portrays SQL Server security models, logins, clients, incompletely contained databases, and cross-server approval. 


  • Verifying Connections to SQL Server 
  • Approving Logins to Connect to databases 
  • Approval Across Servers 
  • Mostly Contained Databases 

Lab : Authenticating Users 

  • Make Logins 
  • Make Database Users 
  • Rectify Application Login Issues 
  • Arrange Security for Restored Databases 

In the wake of finishing this module, you will have the capacity to: 

  • SQL Server essential ideas. 
  • SQL Server association verification. 
  • Client login approval to databases. 
  • Mostly contained databases. 
  • Approval crosswise over servers. 

Module 2: Assigning Server and Database Roles 

Utilizing parts disentangles the administration of client consents. With parts, you can control verified clients' entrance to framework assets in light of every client's employment work—as opposed to allocating consents client by-client, you can concede authorizations to a part, at that point make clients individuals from parts. Microsoft SQL Server incorporates bolster for security parts characterized at server level and at database level. 


  • Working with server parts 
  • Working with Fixed Database Roles 
  • Appointing User-Defined Database Roles 

Lab : Assigning server and database parts 

  • Appointing Server Roles 
  • Appointing Fixed Database Roles 
  • Appointing User-Defined Database Roles 
  • Checking Security 

Subsequent to finishing this module, you will have the capacity to: 

  • Depict and utilize server parts to oversee server-level security. 
  • Depict and utilize settled database parts. 
  • Utilize custom database parts and application parts to oversee database-level security. 

Module 3: Authorizing Users to Access Resources 

In the past modules, you have perceived how Microsoft SQL Server security is composed and how sets of consents can be allocated at the server and database level by utilizing settled server parts, client characterized server parts, settled database parts, and application parts. The last stride in approving clients to get to SQL Server assets is the approval of clients and parts to get to server and database objects. In this module, you will perceive how these question consents are overseen. Notwithstanding access authorizations on database objects, SQL Server gives the capacity to figure out which clients are permitted to execute code, for example, put away techniques and capacities. By and large, these consents and the authorizations on the database objects are best arranged at the blueprint level as opposed to at the level of the individual protest. Pattern based consent awards can disentangle your security engineering. You will investigate the giving of consents at the blueprint level in the last lesson of this module. 


  • Approving User Access to Objects 
  • Approving Users to Execute Code 
  • Designing Permissions at the Schema Level 

Lab : Authorizing clients to get to assets 

  • Allowing, Denying, and Revoking Permissions on Objects 
  • Allowing EXECUTE Permissions on Code 
  • Allowing Permissions at the Schema Level 

In the wake of finishing this module, you will have the capacity to: 

  • Approve client access to objects. 
  • Approve clients to execute code. 
  • Design authorizations at the diagram level. 

Module 4: Protecting Data with Encryption and Auditing 

While designing security for your Microsoft SQL Server frameworks, you ought to guarantee that you meet any of your association's consistence prerequisites for information assurance. Associations frequently need to hold fast to industry-particular consistence arrangements, which command examining of all information get to. To address this prerequisite, SQL Server gives a scope of alternatives to actualizing examining. Another regular consistence necessity is the encryption of information to secure against unapproved access in the occasion that entrance to the database records is traded off. SQL Server bolsters this prerequisite by giving straightforward information encryption (TDE). To lessen the danger of data spillage by clients with regulatory access to a database, sections containing delicate information, for example, Mastercard numbers or national character numbers—can be scrambled utilizing the Always Encrypted highlight. This module depicts the accessible alternatives for examining in SQL Server, how to utilize and deal with the SQL Server Audit highlight, and how to actualize encryption. 


  • Choices for reviewing information access in SQL Server 
  • Executing SQL Server Audit 
  • Overseeing SQL Server Audit 
  • Ensuring Data with Encryption 

Lab : Using Auditing and Encryption 

  • Working with SQL Server Audit 
  • Encode a Column as Always Encrypted 
  • Encode a Database utilizing TDE 

Subsequent to finishing this module, you will have the capacity to: 

  • Depict the choices for examining information get to. 
  • Execute SQL Server Audit. 
  • Oversee SQL Server Audit. 
  • Depict and execute techniques for encoding information in SQL Server. 
  • Actualize encryption 

Module 5: Recovery Models and Backup Strategies 

A standout amongst the most imperative parts of a database head's part is guaranteeing that authoritative information is dependably went down so that, if a disappointment happens, you can recuperate the information. Despite the fact that the processing business has thought about the requirement for dependable reinforcement methodologies for a considerable length of time—and talked about this at awesome length—grievous stories with respect to information misfortune are as yet typical. A further issue is that, notwithstanding when the methodologies set up function as they were planned, the results still routinely neglect to meet an association's operational prerequisites. In this module, you will consider how to make a methodology that is lined up with authoritative requirements, in light of the accessible reinforcement models, and the part of the exchange sign in keeping up database consistency 


  • Understanding Backup Strategies 
  • SQL Server Transaction Logs 
  • Arranging Backup Strategies 

Lab : Understanding SQL Server recuperation models 

  • Plan a Backup Strategy 
  • Arrange Database Recovery Models 

In the wake of finishing this module, you will have the capacity to: 

  • Portray different reinforcement procedures. 
  • Portray how database exchange logs work. 
  • Plan SQL Server reinforcement procedures. 

Module 6: Backing Up SQL Server Databases 

In the past module, you figured out how to design a reinforcement procedure for a SQL Server framework. You would now be able to figure out how to perform SQL Server reinforcements, including full and differential database reinforcements, exchange log reinforcements, and halfway reinforcements. In this module, you will figure out how to apply different reinforcement methodologies. 


  • Moving down Databases and Transaction Logs 
  • Overseeing Database Backups 
  • Propelled Database Options 

Lab : Backing Up Databases 

  • Moving down Databases 
  • Performing Database, Differential, and Transaction Log Backups 
  • Playing out a Partial Backup 

Subsequent to finishing this module, you will have the capacity to: 

  • Perform reinforcements of SQL Server databases and exchange logs. 
  • Oversee database reinforcements. 
  • Depict propelled reinforcement alternatives. 

Module 7: Restoring SQL Server 2016 Databases 

In the past module, you figured out how to make reinforcements of Microsoft SQL Server 2016 databases. A reinforcement methodology may include various sorts of reinforcement, so it is basic that you can adequately reestablish them. You will frequently be reestablishing a database in a pressing circumstance. You should, in any case, guarantee that you have a reasonable arrangement of how to continue and effectively recoup the database to the required state. A decent arrangement and comprehension of the reestablish procedure can help abstain from exacerbating things. Some database reestablishes are identified with framework disappointment. In these cases, you will need to restore the framework as close as conceivable to the state it was in before the disappointment. A few disappointments, however, are identified with human mistake and you may wish to recoup the framework to a point before that blunder. The point-in-time recuperation components of SQL Server 2016 can help you to accomplish this. Since they are ordinarily substantially bigger, client databases will probably be influenced by framework disappointments than framework databases. In any case, framework databases can be influenced by disappointments, and extraordinary care ought to be taken while recuperating them. Specifically, you have to see how to recoup every framework database since you can't utilize a similar procedure for all framework databases. In this module, you will perceive how to reestablish client and framework databases and how to execute point-in-time recuperation. 


  • Understanding the Restore Process 
  • Reestablishing Databases 
  • Progressed Restore Scenarios 
  • Point-in-Time Recovery 

Lab : Restoring SQL Server Databases 

  • Reestablishing a Database Backup 
  • Restring Database, Differential, and Transaction Log Backups 
  • Playing out a Piecemeal Restore 

In the wake of finishing this module, you will have the capacity to: 

  • Clarify the reestablish procedure. 
  • Reestablish databases. 
  • Perform progressed reestablish operations. 
  • Play out a point-in-time recuperation. 

Module 8: Automating SQL Server Management 

The apparatuses gave by Microsoft SQL Server make organization simple when contrasted with some other database motors. Notwithstanding, notwithstanding when assignments are anything but difficult to perform, it is regular to need to rehash an undertaking ordinarily. Productive database overseers figure out how to mechanize tedious errands. This can keep away from circumstances where an overseer neglects to execute an assignment at the required time. Maybe more imperatively, the mechanization of assignments guarantees that they are performed reliably, each time they are executed. This module portrays how to utilize SQL Server Agent to computerize employments, how to arrange security settings for occupations, and how to execute multiserver occupations. 


  • Robotizing SQL Server administration 
  • Working with SQL Server Agent 
  • Overseeing SQL Server Agent Jobs 
  • Multi-server Management 

Lab : Automating SQL Server Management 

  • Make a SQL Server Agent Job 
  • Test a Job 
  • Timetable a Job 
  • Arrange Master and Target Servers 
  • In the wake of finishing this module,


20764: Administering a SQL Database Infrastructure Course Prerequisites

Notwithstanding their expert experience, understudies who go to this preparation should as of now have the accompanying specialized information: 

  • Essential information of the Microsoft Windows working framework and its center usefulness. 
  • Working learning of Transact-SQL. 
  • Working learning of social databases. 
  • Some involvement with database outline.

Are you being sponsored by your employer to take this class?
Contact No.
  • *I authorize Microtek Learning to contact me via Phone/Email