Overview/Description
SSIS consists of several layers, including digital signatures and database roles, to provide a rich and flexible security environment. This course covers techniques and recommendations on how to secure an SSIS deployment.
Target Audience
Data warehouse developers and database administrators who create and manage business intelligence solutions as part of their daily tasks, which include implementing data warehouse databases, extracting and transforming data as part of an ETL solution, and data cleansing