Course description
The SQL Server 2012: Security Basics course will show you the basics of SQL Server security by giving you an understanding of potential data threats and how SQL Servers design protects against them. You will then learn about SQL Server and Windows integrated authentication. Then see how SQL Server provides an authorization system to control access to data and objects.
Prerequisites
The users should have a working knowledge of the Microsoft OS and Server environment but does not require any prior experience with Microsoft SQL Server or with database programming.
Learning Paths
This course is part of the following LearnNowOnline SuccessPaths™:
SQL Server Core
Meet the expert
Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.
Course outline
Introduction + Authentication
Introduction (15:01)
- Introduction (00:38)
- Security Overview (01:26)
- The Threats (04:05)
- Security Design Philosophy (03:26)
- The Two Stages of Security (01:52)
- Key SQL Server Security Terms (03:06)
- Summary (00:25)
Authentication (18:57)
- Introduction (00:36)
- Authentication (02:39)
- Integrated Authentication (01:17)
- Security Settings (00:37)
- Demo: Server Authentication (01:09)
- Demo: Setting Validation (00:36)
- Demo: Adding a User As a Login (03:16)
- Demo: Assigning Permissions (03:56)
- Demo: Adding Users Via Script (04:26)
- Summary (00:20)
SQL Server Authentication (15:25)
- Introduction (01:03)
- Demo: Create SQL Login (02:22)
- Windows and SQL Server Logins (01:18)
- Beware of the sa Login (02:42)
- Password Policy & Enforcement (01:45)
- Demo: Account Policies (02:47)
- Demo: Login Properties (02:46)
- Summary (00:38)
Contained and Authorization
Contained Databases (20:42)
- Introduction (01:03)
- Database Authentication (00:49)
- Demo: How to Enable Contained Databases (08:13)
- Demo: Change Authorization (04:58)
- Contained DB Authentication (05:05)
- Summary (00:32)
Authorization (29:01)
- Introduction (00:38)
- Authorization (00:48)
- Principals (03:56)
- Fixed Server Roles (02:22)
- Demo: Assigning a Login (03:36)
- User-Defined Server Roles (01:16)
- Demo: Create a New Server Role (06:00)
- Fixed Database Roles (02:30)
- Demo: Add a Back-up Operator (01:21)
- The Public Role (01:00)
- The dbo (Database Owner) Role (00:49)
- User-Defined Database Roles (01:17)
- Demo: Create a Database Role (01:28)
- Securable Objects (01:34)
- Summary (00:19)