SQL Server 2012, Part 6 of 9: Permissions and Data Protection
Interactive

SQL Server 2012, Part 6 of 9: Permissions and Data Protection

LearnNow Online
Updated Aug 22, 2018

Course description

In the SQL Server 2012: Permissions and Data Protection course you will understand permissions in SQL Server and how they provide granular control over data and objects. Then you will learn how to provide a final layer of defense by encrypting data.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

The users should have a working knowledge of the Microsoft OS and Server environment but does not require any prior experience with Microsoft SQL Server or with database programming.


Meet the expert

Don Kiely

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Video Runtime

110 Minutes

Time to complete

425 Minutes

Course Outline

Permissions, Schemas, Metadata

Permissions (19:28)

  • Introduction (00:41)
  • Permissions (01:25)
  • Permission Types (04:15)
  • Permission Statements (02:01)
  • Granting Permissions (00:38)
  • Demo: Assigning Permissions (04:58)
  • Roles, Permissions and Schemas (02:54)
  • Summary (00:38)
  • Demo: Potential Problems (06:40)

Default Schemas (17:15)

  • Granting Permissions (00:38)
  • Demo: Assigning Permissions (04:58)
  • Roles, Permissions and Schemas (02:54)
  • Introduction (00:52)
  • Demo: Potential Problems (06:40)
  • Summary (00:41)

Execution and Metadata (21:30)

  • Introduction (00:44)
  • Execution Context (02:23)
  • Ownership Chaining (01:13)
  • Changing the Execution Content (04:14)
  • Demo: Execution content (06:25)
  • Metadata Security (01:57)
  • Demo: Permissions and Metadata (04:17)
  • Summary (00:13)
Encryption

Data Encryption (21:29)

  • Introduction (00:35)
  • Data Encryption (03:28)
  • Encryption Keys (04:33)
  • Demo: How Encryption Works (10:30)
  • Key Management (01:48)
  • Summary (00:32)

Encrypting Data (30:48)

  • Introduction (00:40)
  • Demo: Table Creation (01:59)
  • Demo: Certificate Keys (08:45)
  • Demo: Asymmetric Keys (07:46)
  • Demo: Symmetric Keys (10:10)
  • Summary (01:26)
;