We offers you the most effective way to upgrade your MCDBA to SQL Server 2005 technology.
UPGRADE: MCDBA Skills to MCITP Database Administrator by Using Microsoft SQL Server 2005 certification training course teaches students how to optimize and maintain database solutions using SQL Server 2005, including two or more of the following phases in the product life cycle: design, development, deployment, optimization, maintenance, or support. Upon completion of this course, students will be armed with the knowledge and skills to: define high-availability solutions, automate administrative tasks, define security solutions, monitor and troubleshoot the database server, design and execute deployments and define the infrastructure (such as storage, hardware, and number of servers or instances).
When you pass Exam 70-447 TS: UPGRADE: MCDBA Skills to MCITP Database Administrator by Using Microsoft SQL Server 2005 you complete the requirements for the following certification:
Microsoft Certified IT Professional, Database Administrator
If you are an MCDBA, with this course you will have the nessersary training to pass the:
NOTE: All prices (above) are stated in Great British Pounds (£) and EXCLUDE any external examination fees. All prices are +VAT for EU sales
To view the total price including VAT, simply click the "buy" and "checkout" buttons, then select your country.
Using SQL Server Profiler and System Monitor Troubleshoot Performance Issues Narrowing Down a Performance Issue to a Database Object Troubleshooting Database Server Performance Issues Query Performance Troubleshooting Process Optimizing the Query Performance Environment Troubleshooting SQL Server Connectivity Issues Areas to Troubleshoot for Connectivity Issues Troubleshooting SQL Server Data Issues Troubleshooting Data Integrity Issues Troubleshooting Concurrency Issues SQL Server Data Concurrency Issues
Planning an Automated System for Database Maintenance Planning an Automated System for Server Maintenance Documenting Administration and Automation Information Managing SSIS Packages Managing Replication Managing Reporting Services
Determining Appropriate High-Availability Solutions Identifying High-Availability Requirements and Constraints Analyzing High-Availability Requirements and Constraints High-Availability Solution Determining Storage Requirements for SQL Server Databases Determining Storage Requirements for SQL Server Components and Files Designing Storage Solutions for SQL Server Databases Designing a Backup and Restore Strategy Designing the Platform for Failover Clustering Designing the SQL Server Cluster Implementation Designing Recovery Strategies and a Test Plan for Failover Clustering Migrating and Upgrading SQL Server Clusters Designing an Operations Plan for Clustering Introduction to Designing a Log Shipping Solution Designing Log Shipping Server Roles and Topology Designing a Log Shipping Upgrade Strategy Designing an Operations Plan for Log Shipping Introduction to Designing a Database Mirroring Solution Designing Database Roles and Topology for Database Mirroring Converting High-Availability Solutions to Database Mirroring Designing an Operations Plan for Database Mirroring Introduction to Designing a Replication Solution Designing a Replication Solution Designing a Replication Upgrade Strategy Designing an Operations Plan for Replication Evaluating Weaknesses in Each High-Availability Technology Maximizing Availability by Combining High-Availability Technologies Documenting High-Availability Solutions Creating a Test Plan for High-Availability Solutions
Principles of Database Security Security Standards Methodology for Designing a SQL Server Security Policy Monitoring SQL Server Security Developing an Authentication Policy Developing Server-Level Security Policies Developing a Secure Communication Policy Defining SQL Server Security-Monitoring Standards Designing an Instance-Level Security Policy Designing a Database-Level Security Policy Designing an Object-Level Security Policy Defining Security Monitoring Standards for Instances and Databases Securing Data by Using Encryption and Certificates Designing Data Encryption Policies Determining a Key Storage Method Analyzing Business and Regulatory Requirements Determining the Exceptions and Their Impact Constraints of Government Regulations Designing a Response Policy for Virus and Worm Attacks Designing a Response Policy for Denial of Service Attacks Designing a Response Policy for Internal and SQL Injection Attacks
Estimating Storage Requirements Estimating CPU Requirements Estimating Memory Requirements Estimating Network Requirements Analyzing Capacity Needs Identifying Requirements That Affect Data Archiving Determining the Structure of Archival Data Creating a Data Archival Plan Overview of Database Server Consolidation Designing a Database Server Consolidation Strategy Selecting a Data Distribution Tool Creating a Data Distribution Plan Using Replication Evaluating the Current Database Server Infrastructure Gathering Requirements for Changing a Database Server Infrastructure Designing Modifications to a Database Server Infrastructure Designing a Backup and Restore Strategy Creating a Database Disaster Recovery Plan Establishing Database Naming Conventions Defining Database Standards
After Effects CS3 Training After Effects CS4 Training Encore CS3 Training Premiere CS3 Training Premiere CS4 Training Soundbooth CS3 Training Soundbooth CS4 Training