+40 256 706 057 [email protected]
MS SQL Server 2012 for Developers

MS SQL Server 2012 for Developers

MS SQL Server 2012 for Developers

Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training. A 3 days seminar for Developers

View agendaSet up training

This training is for

Developers

Agenda

1. Fundamente

Sintaxa TSQL

Modul de funcționare (flow-ul) unui Query

Data type-uri și alegerea data type-urilor pentru chei

Filtrare și ordonare

2. Combinare seturi de date

Tipuri Join-uri

Subquery-uri, Table Expressions, APPLY

Uniuni, intersecții și EXCEPT

3. Grupări

Grouped Queries (Single grouping set, multiple grouping sets)

Pivoting / Unpivoting

Funcții Windows

4. Query Full-text

Cataloage Full-text și indecsi full-text

CONTAINS și FREETEXT

Semantic Search

5. Administrare XML

Returnarea rezultatelor în format XML

Interogări cu XMLT

6. Administrarea tabelelor și forțarea integrității datelor

Sintaxa CREATE și ALTER TABLE

Integritatea datelor

  • Constrângeri chei primare
  • Constrângeri unicitate
  • Constrângeri chei foreign
  • Constrângeri CHECK
  • Constrângeri DEFAULT

7. Proiectarea View-urilor, funcțiilor inline și a sinonimelor

8. Inserarea, actualizarea și ștergerea datelor

INSERT VALUES / INSERT SELECT/ INSERT EXEC / SELECT INTO

UPDATE / UPDATE cu JOIN / UPDATE și Table Expression / UPDATE și variabile / UPDATE ALL

DELETE / TRUNCATE / DELETE cu JOIN / DELETE și Table Expression

DELETE vs. TRUNCATE

9. Alte aspecte legate de modificarea datelor

IDENTITY

MERGE

OUTPUT

Functionalități vechi pentru modificarea datelor vs. functionalități noi în SQL Server 2012 / SQL Server 2014

10. Tranzacții

Administrarea tranzacțiilor și a concurenței

Implementarea mecanismelor pentru tratarea erorilor

Sintaxe SQL dinamice

11. Rutine T-SQL

Implementarea procedurilor stocate

Implementare trigger

Implementare funcții

12. Utilitare pentru analiza performanței query-urilor

SQL Server Profiler, SQL Trace, SQL Server Extended Events

Optiuni SET Session

View-urile DM

13. Implementarea indecsilor și a statisticilor

Heap și arbori

Folosirea argumentelor de cautare

Statistici

Impact performanță table-scan etc

14. Cursori, set-uri și tabele temporare

Time for action

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Custom training MS SQL server 2012 for developers

15 + 6 =

Windows Client (7/8/10) Automated Deployment, Management and Optimization

Windows Client (7/8/10) Automated Deployment, Management and Optimization

Windows Client (7/8/10) Automated Deployment, Management and Optimization

Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training. A 1-3 days seminar for infrastructure Aarchitects, system & network administrators.

View AgendaSet up your training

This training is for

Infrastructure Architects

System & Network Administrators

Agenda

1. Introduction to Windows Automated Deployment Tools

Windows ADK (Assessment and Deployment Kit)

Microsoft Application Compatibility Toolkit (ACT)

Deployment Image Servicing and Management (DISM)

System Preparation (SysPrep)

Windows Recovery Environment (Windows RE)

Windows Preinstallation Environment (Windows PE)

User State Migration Tool (USMT)

Volume Activation Management Tool

Microsoft Deployment Toolkit (MDT)

Windows Deployment Services (WDS)

2. Automated Deployment Overview

Creating a Windows Reference Image

Deploying Windows with MDT/WDS

Deploying Windows with System Center Configuration Manager

3. Windows Management and Optimization

Access to Windows (BitLocker, Windows to Go, VDI, Client Hyper-V)

Productivity Tips & Tricks (Windows To Go, SkyDrive, BitLocker, DirectAccess, BranchCache, Folder Redirection, UE-V & App-V, File History, Storage Spaces)

Windows Apps Management (AppLocker, Group Policy, PowerShell)

Recovery and Security (UEFI, secure boot, DaRT, MBAM, Windows and Azure Backup)

System Center Overview (SCOM, SCCM, SCDPM, SCVMM, Orchestrator)

Time for action

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Custom training Windows client 7810 automated deployment management and optimization

10 + 4 =

Administering MS SQL Server 2012 or 2014

Administering MS SQL Server 2012 or 2014

Administering MS SQL Server 2012 or 2014

Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training. A 3 days seminar for IT Professionals.

View AgendaSet up your training

This training is for

IT Professionals

Agenda

Day 1

Module 1: Introduction to SQL Server 2014 Database Administration

This module introduces the Microsoft SQL Server 2014 platform. It describes the components, editions, and versions of SQL Server 2014, and the tasks that a database administrator commonly performs for a SQL Server instance.

Lessons:

Database Administration Overview

Introduction to the SQL Server Platform

Database Management Tools and Techniques

Lab: Using SQL Server Administrative Tools

Using SQL Server Management Studio

Using the sqlcmd Utilityrm

Using Windows PowerShell with SQL Server

Module 2: Installing and Configuring SQL Server 2014

This module explains how to assess resource requirements for SQL Server 2014 and how to install it.

Lessons:

Planning SQL Server Installation

Installing SQL Server 2014

Post-Installation Configuration

Lab: Installing SQL Server 2014

Preparing to Install SQL Server

Installing SQL Server

Performing Post-Installation Configurationr

Module 3: Working with Databases and Storage

This module describes how data is stored in databases, how to create databases, how to manage database files, and how to move them. Other tasks related to storage, include managing the tempdb database and using fast storage devices to extend the SQL Server buffer pool cache, are also discussed.

Lessons:

Introduction to Data Storage with SQL Server

Managing Storage for System Databases

Managing Storage for User Databases

Moving Database Files

Configuring the Buffer Pool Extension

Lab: Managing Database Storage

Configuring tempdb Storage

Creating Databases

Attaching a Database

Module 4: Planning and Implementing a Backup Strategy

In this module, you will consider how to create a backup strategy that is aligned with organizational needs, and learn how to perform the backup operations required by that strategy.

Lessons:

Understanding SQL Server Recovery Models

Planning a Backup Strategy

Backing up Databases and Transaction Logs

Using Backup Options

Ensuring Backup Reliability

Lab: Backing Up SQL Server Databases

Backing Up Database

Performing Database, Differential, and Transaction Log Backups

Performing a Partial Backup

Module 5: Restoring SQL Server 2014 Databases

In this module, you will see how to restore user and system databases and how to implement point-intime recovery.

Lessons:

Planning the Restore Process

Restoring Databases

Advanced Restore Scenarios

Working with Point-in-Time Recovery

Lab: Restoring SQL Server Databases

Restoring a Database Backup

Restoring Database, Differential, and Transaction Log Backups

Performing a Piecemeal Restore

Day 2

Module 6: Importing and Exporting Data

In this module, you will briefly explore tools and techniques so that you can import and export data to and from SQL Server.

Lessons:

Introduction to Transferring Data

Importing and Exporting Table Data

Copying or Moving a Databasey

Lab: Importing and Exporting Data

Using the SQL Server Import and Export Wizard

Using the bcp Utility

Using the BULK INSERT Statement

Using the OPENROWSET Function

Module 7: Monitoring SQL Server 2014

This module explains how to use three of the most commonly used tools: Activity Monitor, dynamic management views and functions (DMVs and DMFs), and Performance Monitor.

Lessons:

Introduction to Monitoring SQL Server

Dynamic Management Views and Functions

Performance Monitor Lab: Monitoring SQL Server 2014

Collecting Baseline Metrics

Monitoring a Workload

Module 8: Tracing SQL Server Activity

This module describes how to use SQL Server Profiler and SQL Trace stored procedures to capture information about SQL Server, and how to use that information to troubleshoot and optimize SQL Server workloads.

Lessons:

Tracing SQL Server Workload Activity

Using Traces

Lab: Tracing SQL Server Workload Activity

Capturing a Trace in SQL Server Profiler

Generating Database Tuning Recommendations

Using SQL Trace

Module 9: Managing SQL Server Security

In this module, you will be learn about the core concepts on which the SQL Server security architecture is based, and how to manage security at the server and database levels.

Lessons:

Introduction to SQL Server Security

Managing Server-Level Security

Managing Database-Level Principals

Managing Database Permissions

Lab: Managing SQL Server Security

Managing Server-Level Security

Managing Database-Level Security

Testing Database Access

Day 3

Module 10: Auditing Data Access and Encrypting Data

This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server audit feature, and how to implement encryption.

Lessons:

Auditing Data Access in SQL Server

Implementing SQL Server Audit

Encrypting Databases

Lab: Auditing Data Access and Encrypting Data

Implementing Auditing

Implementing Transparent Database Encryption

Module 11: Performing Ongoing Database Maintenance

This module describes common database maintenance tasks that a DBA must perform, and demonstrates how to automate these tasks using maintenance plans.

Lessons:

Ensuring Database Integrity

Maintaining Indexes

Automating Routine Database Maintenance

Lab: Performing Ongoing Database Maintenance

Managing Database Integrity

Managing Index Fragmentation

Implementing a Maintenance Plan

Module 12: Automating SQL Server 2014 Management

This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multi-server jobs.

Lessons:

Automating SQL Server Management

Implementing SQL Server Agent Jobs

Managing SQL Server Agent Jobs

Managing Job Step Security Contexts

Managing Jobs on Multiple Servers

Lab: Automating SQL Server Management

Creating a Job

Scheduling a Job

Configuring Job Step Security Contexts

Module 13: Monitoring SQL Server 2014 by Using Alerts and Notifications

This module covers the configuration of database mail, alerts, and notifications.

Lessons:

Monitoring SQL Server Errors

Configuring Database Mail

Configuring Operators, Alerts, and Notifications

Lab: Monitoring SQL Server by Using Alerts and Notifications

Configuring Database Mail

Implementing Operators and Notifications

Implementing Alerts

Time for action

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Custom training Administering ms sql server 2012 or 2014

11 + 4 =

IT Risk Assessment and Risk Management

IT Risk Assessment and Risk Management

IT Risk Assessment and Risk Management

Hands-on practice with thorough explanations, presentations, demos, small standalone exercises during the training.
A 1-2 days seminar for management (CEO/COO/CFO/CMO), finance, HR, legal, technical management (CTO/CIO/CISO), infrastructure architects, software architects, project managers.

What you’ll learn

This training is for

Management (CEO/COO/CFO/CMO)

Legal

Software architects

Finance

Technical management (CTO/CIO/CISO)

Project managers

HR

Infrastructure architects

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Agenda

1. IT Risk overview & principles

Permanent connection to business objectives

Enterprise risk appetite and risk tolerance

Balancing costs and benefits of managing IT Risk

Promoting fair and open communication of IT Risk

RACI charts (responsible, accountable, consulted, informed)

IT Risk as a continuous process

Integrating IT Risk into overall Enterprise Risk Management (ERM)

Understand how to respond to IT Risk

2. The CoBIT Risk IT Framework

Set of defined governance practices

End-to-end process framework for successful IT risk management

Generic list of common, potentially adverse, IT-related risk scenarios that could impact business objectives

Tools and techniques needed to understand concrete risks to business operations

e. o Risk Governance

  • Establish and Maintain a Common Risk View
  • Integrate with Enterprise Risk Management (ERM)
  • Make Risk-aware Business Decisions

Risk Evaluation (Collect Data, Analyze Risk, Maintain Risk Profile)

Risk Response (Articulate Risk, Manage Risk, React to Events)

3. The CoBIT Risk IT Practitioner Guide

Building scenarios, based on a set of generic IT risk scenarios

Building a risk map, using techniques to describe the impact and frequency of scenarios

Building impact criteria with business relevance

Defining KRIs (Key Risk Indicators)

GET COMPREHENSIVE TRAINING FOR YOUR TEAM

Cybersecurity Training

Cybersecurity Training

A 2-to-3 days training

Cybersecurity Training

This 2-3 days seminar is designed for developers, testers, QA, project managers, database admins, system and network administrators.

Set up your trainingView Agenda

The cybersecurity training covers areas that help IT professionals understand more detailed aspects of the weaknesses, attacks, and defenses used to attack or protect critical infrastructure.

Here’s what your team will get

Customized training for your exact needs

This training is full of real-life examples, findings from studies and practical approaches your team will find useful to know in order to protect their code and applications.

Get familiar with cybersecurity

They will learn about the methods and tools used by malicious attackers to target IT systems (networks, servers, websites)

Gain essential know-how

Have high level overview of the steps needed to prevent, detect and mitigate cyber threats.

A deeper understanding of cybersecurity

Give a starting point for sysadmins, web developers and testers in addressing security within the projects they are involved in moving forward.

Full slides and additional resources

After the seminar they will get access to all the slides presented. They will also get some extra resources: materials and tools to put your knowledge into practice.

Ask the expert

During the training, they will be able to ask questions from our security expert with over 10 years of experience in the field of security.

Meet the Trainer

Tudor Damian Cybersecurity Awareness seminar

Tudor Damian
Microsoft Cloud and Datacenter Management MVP
Certified Ethical Hacker

CEH certification - Cybersecurity Awareness Seminar
Microsoft MVP certification - Cybersecurity Awareness Seminar

As an IT consultant with more than 10 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP and a technical speaker at local and regional community events.

He often talks about the latest technologies and trends with themes including cloud and hybrid networking & security, virtualization technologies, social engineering and information security awareness, web application security, white-hat hacking and penetration testing techniques.

Testimonials

Well organized materials, a perfect introduction to security.

Gabriel Musteata

PHP TeamLeader

In my position working on pre-sales and projects specifications I came across clients and security requests every day and the general knowledge from here will be very helpful.

Dan Tudorache

Technical Consultant

I think this is a course that should be consider by all developers and IT specialists.

Iulia Chitan

Ruby developer

Agenda

Z

Security landscape overview:

Industry trends, the “Browser Wars”, relevant information sources and keeping up-to-date

Z

The need for Security Analysis:

Industry Trends, Security Testing Methodologies (OSSTMM), Planning and Scheduling

Z

Foundations of Security:

Footprinting, Reconnaissance, Scanning, Enumeration, Sniffing, System Hacking, Trojans/Viruses/Worms, Cryptography, Denial of Service, Hacking Wireless Networks, Social Engineering, Cloud Security

Z

MITRE Overview:

CVE & CVSS, CWE & CWSS, CAPEC, OVAL, MAEC, OASIS

Z

SANS CWE Top 25

Z

OWASP Mobile & IoT Top 10 Overview

Z

Attack Detection and Mitigation:

Mitigation Techniques specific to OWASP Top 10 (A1-A10), Developing Secure Code, Static Code Analysis, Security Reviews, SDLC & Microsoft SDL

Z

Vulnerability Assessments & Tools:

OWASP ASVS, White / Grey / Black-box Pentesting, Risk Assessments and Risk Management

Z

Other Noteworthy Vulnerabilities:

Denial of Service, Malicious File Execution, Information Leakage and Improper Error Handling, Insufficient Anti-Automation, Clickjacking, Concurrency Flaws, Lack of Intrusion Detection and Response, etc.

Z

Attacking Web Servers & Web Applications:

Footprinting the Web Infrastructure, Defense in Depth, Attacking Web Servers, Analyzing Web Applications, Authentication Mechanisms, Authorization Schemes, Session Management, Injection Attacks, Man-in-the-Middle Attacks, Data Connectivity, Web App Clients, Web Services

Z

OWASP Web Top 10:

Injection (A1), Broken Authentication and Session Management (A2), XSS/Cross-Site Scripting(A3), Insecure Direct Object References (A4), Security Misconfiguration (A5), Sensitive Data Exposure (A6), Missing Function Level Access Control (A7), CSRF/Cross-Site Request Forgery (A8), Using Known Vulnerable Components (A9), Unvalidated Redirects and Forwards (A10)

Who is this cybersecurity training for?

This cyber security training is indispensable for all IT professionals.

$
Project managers
$
Team leaders
$
Developers
$
Testers
$
QA
$
Database admins
$
System & network administrators

This cyber security training will help them learn critical techniques necessary to defend against network attacks, cyber security breaches, as well as ways to protect their technology or solution through cryptography, intrusion detection and more.

Why should your company care about cybersecurity training?

Recent IT security studies show that it takes 200 days on average to detect a security breach, and another 80 days to recover from it.

Mastering a set of techniques necessary to defend against network attacks, cybersecurity breaches, as well as ways to protect their technology or solution through cryptography, intrusion detection and other vulnerabilities is essential for every business.

cybersecurity training attacks are changing

Essential Topics Covered

Everything you need for a solid foundation on cybersecurity

This cybersecurity training helps people in the IT field get familiar with many aspects of IT security. We start by looking at the current security trends in the industry, then go through a high-level overview of testing methodologies like the OSSTMM (Open Source Security Testing Methodology Manual).

$

During the 2-3 days of the course, we will cover the most important aspects of security. These includes Footprinting, Reconnaissance, Scanning, Enumeration, Sniffing, System Hacking, Trojans/Viruses/Worms, Cryptography, Denial of Service, Hacking Wireless Networks, Social Engineering, Cloud Security.

We’ll also address the MITRE CWE/CWSS and CVE/CVSS lists and rating methods for weaknesses and vulnerabilities.

$
We also discuss other noteworthy vulnerabilities (Denial of Service, Malicious File Execution, Information Leakage and Improper Error Handling, Insufficient Anti-Automation, Clickjacking, Concurrency Flaws, Lack of Intrusion Detection and Response, etc.)
$
A good deal of the content will then focus on methods of attacking web servers and web applications (Footprinting the Web Infrastructure, Defense in Depth, Attacking Web Servers, Analyzing Web Applications, Authentication Mechanisms, Authorization Schemes, Session Management, Injection Attacks, Man-in-the-Middle Attacks, Data Connectivity, Web App Clients, Web Services), as well as OWASP Top 10 (Web, IoT and Mobile) and the SANS CWE Top 25.
$

The last part of the seminar covers both vulnerability assessments and tools (OWASP ASVS, OWASP Testing Guide & Code Review Guide, White/Grey/Black-box Pentesting, Risk Assessments and Risk Management), as well as attack detection and mitigation techniques.

This will help you get a good overview of IT Security in general and Web Security in particular.

Testimonials

It achieved what I was hoping it would: give a great introduction into the fantastic world of cyber-security. Now I know, in the context of security, what questions to ask and where to look for the answers.

Radu Murzea

Backend PHP Developer

In my position working on pre-sales and projects specifications I came across clients and security requests every day and the general knowledge from here will be very helpful.

Dan Tudorache

Technical Consultant

I think this is a course that should be consider by all developers and IT specialists.

Iulia Chitan

Ruby developer

Prerequisites

The participants should have a basic level understanding of IT and web technologies, such as network, servers, databases and web application functionality.

Time for action

Defend against attacks and protect your business

Maximize your company investment by building the best-customized training that meets the professional development needs of your team.

Custom training Cybersecurity training

7 + 10 =

Pin It on Pinterest