SQL 2014 Admin, Part 3 of 5: Security and Resource Mgmt
Interactive

SQL 2014 Admin, Part 3 of 5: Security and Resource Mgmt

Biz Library
Updated Feb 04, 2020

Security is a concern of everyone. In this course you see some of the features in SQL Server that relate to security. You are going to see the encryption keys that SQL Server creates and uses, along with certificates, to protect everything from cell level data to entire databases. Then you will see how Transparent Data Encryption can help to quickly bring a database into compliance with most regulations and requirements. You will also see what exactly is required to move an encrypted database to a new server without losing any data. User defined server roles was a new SQL Server 2012 feature that makes administration easier when it comes to security. You will see this and even create your own Server Role for members of the data team. Next you will see ways to protect individual objects in your databases using security permissions and show how, as the DBA, you can test your configuration using the Execute As capabilities of SQL Server. Next you are going to see the Resource Governor and Policy Based management. You will see the Components of the Resource Governor and see how you can use this great feature of Enterprise edition to classify incoming connections and identify specific users or groups that are using excessive resources on the server. You will then see the Policy Group Management feature of SQL Server. You will view how to create policies that check and enforce naming conventions and ensure proper backups are being configured on your servers.


Lesson 1:

  • Database Encryption Keys
  • Managing Encryption
  • Service Master Key
  • Backup the SMK
  • Restore the SMK
  • Alter the SMK
  • Create a Database Master Key
  • Backup the DMK
  • Restore a DMK
  • Alter a DMK
  • Demo: Backup Master Keys
  • Demo: Alter Master Key
  • Demo: Create Master Key.

Lesson 2:

  • Certificates and Database Keys
  • Transparent Data Encryption
  • TDE - Pros & Cons
  • TDE - Restoring the Backup
  • Demo: Enable TDE
  • Demo: Disable Encryption
  • Demo: Moving TDE
  • Demo: Backup TDE.

Lesson 3:

  • User Defined Server Roles
  • Demo: Creating Roles
  • Protecting Objects
  • Grant Permissions
  • Deny Permissions
  • Revoke Permissions
  • Execute As
  • Demo: Built-In Permissions
  • Demo: Testing Permissions.

Lesson 4:

  • Resource Governor
  • Demo: Resource Governor
  • Demo: Assigning Functions
  • Demo: Performance Monitor.

Lesson 5:

  • Policy-Based Management
  • Central Management Server
  • Demo: Policy Management
  • Demo: Create Policy
  • Demo: Enforcing Policy
  • Demo: Recovery Model
  • Demo: Evaluating Policies
  • Demo: Importing Policies
  • Demo: Policy Violations.