Course description
In the SQL Server 2012: Permissions and Data Protection course you will understand permissions in SQL Server and how they provide granular control over data and objects. Then you will learn how to provide a final layer of defense by encrypting data.
Prerequisites
The users should have a working knowledge of the Microsoft OS and Server environment but does not require any prior experience with Microsoft SQL Server or with database programming.
Learning Paths
This course is part of the following LearnNowOnline SuccessPaths™:
SQL Server Core
Meet the expert
Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.
Course outline
Permissions, Schemas, Metadata
Permissions (19:28)
- Introduction (00:41)
- Permissions (01:25)
- Permission Types (04:15)
- Permission Statements (02:01)
- Granting Permissions (00:38)
- Demo: Assigning Permissions (04:58)
- Roles, Permissions and Schemas (02:54)
- Summary (00:38)
- Demo: Potential Problems (06:40)
Default Schemas (17:15)
- Granting Permissions (00:38)
- Demo: Assigning Permissions (04:58)
- Roles, Permissions and Schemas (02:54)
- Introduction (00:52)
- Demo: Potential Problems (06:40)
- Summary (00:41)
Execution and Metadata (21:30)
- Introduction (00:44)
- Execution Context (02:23)
- Ownership Chaining (01:13)
- Changing the Execution Content (04:14)
- Demo: Execution content (06:25)
- Metadata Security (01:57)
- Demo: Permissions and Metadata (04:17)
- Summary (00:13)
Encryption
Data Encryption (21:29)
- Introduction (00:35)
- Data Encryption (03:28)
- Encryption Keys (04:33)
- Demo: How Encryption Works (10:30)
- Key Management (01:48)
- Summary (00:32)
Encrypting Data (30:48)
- Introduction (00:40)
- Demo: Table Creation (01:59)
- Demo: Certificate Keys (08:45)
- Demo: Asymmetric Keys (07:46)
- Demo: Symmetric Keys (10:10)
- Summary (01:26)