• Online, Self-Paced
Course Description

In an enterprise, security, high availability, and recovery are all very important to ensure the operation of the company. BI administrators need to create strategies and implement them to ensure users can access the data they require, when they require it. In this course, you will explore how to design and implement these strategies in a BI Infrastructure. This course is one of a series in the Skillsoft learning path that helps individuals prepare for the Designing Business Intelligence Solutions with Microsoft SQL Server exam (70-467).

Learning Objectives

Security

  • start the course
  • describe the different authentication mechanisms supported by SSAS
  • configure SSAS to allow for impersonation using Kerberos
  • configure SSAS for trusted delegation using Kerberos
  • use SQL Server Profiler to test for impersonated or delegated identity
  • describe granting access to external users using HTTP and verify the prerequisites in IIS
  • configure external access to SSAS using HTTP by creating the application pool, virtual directory in IIS, and configure IIS authentication
  • configure external access to SSAS using HTTP by granting data access permissions and then testing the configuration
  • implement Dynamic Dimension Security within a cube
  • create roles and define permissions to grant access at different levels for multidimensional models

High Availability

  • describe the high availability solutions that can be used by SQL Server
  • describe how AlwaysON Failover Cluster Instances can be used to ensure high availability for a SQL Server instance
  • describe how AlwaysON Availability Groups can be used for high availability for a SQL Server instance
  • describe how AlwaysON Availability Groups can be used with SSAS and SSRS

Backup, Recovery, and Logging

  • design a recovery strategy for SSAS and SSRS databases
  • perform a backup of SSAS databases
  • perform a backup of the SSRS databases
  • perform a restore of a SSAS database
  • perform a restore of the SSRS databases
  • configure logging within an ETL package, container, and task to capture run-time information
  • enable logging for package execution on the SSIS server
  • view log entries that are written after a package is run in the Log Events Window
  • view package execution reports provided by the SSIS catalog

Practice: Manage BI Operations

  • manage security, high availability, back up and recovery, and logging for a BI infrastructure

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.