Learn your way! Get started

SQL Server 2012, Part 6 of 9: Permissions and Data Protection

with expert Don Kiely


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/15/2012
Level Advanced
Runtime 1h 50m
Closed captioning Included
Transcript Included
eBooks / courseware Included
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In the SQL Server 2012: Permissions and Data Protection course you will understand permissions in SQL Server and how they provide granular control over data and objects. Then you will learn how to provide a final layer of defense by encrypting data.

Prerequisites

The users should have a working knowledge of the Microsoft OS and Server environment but does not require any prior experience with Microsoft SQL Server or with database programming.

Learning Paths

This course is part of the following LearnNowOnline SuccessPaths™:
SQL Server Core

Meet the expert

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Course outline



Permissions, Schemas, Metadata

Permissions (19:28)
  • Introduction (00:41)
  • Permissions (01:25)
  • Permission Types (04:15)
  • Permission Statements (02:01)
  • Granting Permissions (00:38)
  • Demo: Assigning Permissions (04:58)
  • Roles, Permissions and Schemas (02:54)
  • Summary (00:38)
  • Demo: Potential Problems (06:40)
Default Schemas (17:15)
  • Granting Permissions (00:38)
  • Demo: Assigning Permissions (04:58)
  • Roles, Permissions and Schemas (02:54)
  • Introduction (00:52)
  • Demo: Potential Problems (06:40)
  • Summary (00:41)
Execution and Metadata (21:30)
  • Introduction (00:44)
  • Execution Context (02:23)
  • Ownership Chaining (01:13)
  • Changing the Execution Content (04:14)
  • Demo: Execution content (06:25)
  • Metadata Security (01:57)
  • Demo: Permissions and Metadata (04:17)
  • Summary (00:13)

Encryption

Data Encryption (21:29)
  • Introduction (00:35)
  • Data Encryption (03:28)
  • Encryption Keys (04:33)
  • Demo: How Encryption Works (10:30)
  • Key Management (01:48)
  • Summary (00:32)
Encrypting Data (30:48)
  • Introduction (00:40)
  • Demo: Table Creation (01:59)
  • Demo: Certificate Keys (08:45)
  • Demo: Asymmetric Keys (07:46)
  • Demo: Symmetric Keys (10:10)
  • Summary (01:26)