SQL Server 2014, Part 5 of 9: Security Basics
Interactive

SQL Server 2014, Part 5 of 9: Security Basics

LearnNow Online
Updated Aug 22, 2018

Course description

The SQL Server 2014: Security Basics course will show you the basics of SQL Server security by giving you an understanding of potential data threats and how SQL Servers design protects against them. You will then learn about SQL Server and Windows integrated authentication. Then see how SQL Server provides an authorization system to control access to data and objects.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that you have at least a basic familiarity with the concept of relational databases and a basic understanding of what SQL Server is and the high-level tools in it, as well as how to create and manage objects using Management Studio.


Meet the expert

Don Kiely

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Video Runtime

99 Minutes

Time to complete

386 Minutes

Course Outline

Introduction + Authentication

Introduction (15:01)

  • Introduction (00:38)
  • Security Overview (01:26)
  • The Threats (04:05)
  • Security Design Philosophy (03:26)
  • The Two Stages of Security (01:52)
  • Key SQL Server Security Terms (03:06)
  • Summary (00:25)

Authentication (18:57)

  • Introduction (00:36)
  • Authentication (02:39)
  • Integrated Authentication (01:17)
  • Security Settings (00:37)
  • Demo: Server Authentication (01:09)
  • Demo: Setting Validation (00:36)
  • Demo: Adding a User As a Login (03:16)
  • Demo: Assigning Permissions (03:56)
  • Demo: Adding Users Via Script (04:26)
  • Summary (00:20)

SQL Server Authentication (15:25)

  • Introduction (01:03)
  • Demo: Create SQL Login (02:22)
  • Windows and SQL Server Logins (01:18)
  • Beware of the sa Login (02:42)
  • Password Policy & Enforcement (01:45)
  • Demo: Account Policies (02:47)
  • Demo: Login Properties (02:46)
  • Summary (00:38)
Contained and Authorization

Contained Databases (20:42)

  • Introduction (01:03)
  • Database Authentication (00:49)
  • Demo: How to Enable Contained Databases (08:13)
  • Demo: Change Authorization (04:58)
  • Contained DB Authentication (05:05)
  • Summary (00:32)

Authorization (29:01)

  • Introduction (00:38)
  • Authorization (00:48)
  • Principals (03:56)
  • Fixed Server Roles (02:22)
  • Demo: Assigning a Login (03:36)
  • User-Defined Server Roles (01:16)
  • Demo: Create a New Server Role (06:00)
  • Fixed Database Roles (02:30)
  • Demo: Add a Back-up Operator (01:21)
  • The Public Role (01:00)
  • The dbo (Database Owner) Role (00:49)
  • User-Defined Database Roles (01:17)
  • Demo: Create a Database Role (01:28)
  • Securable Objects (01:34)
  • Summary (00:19)
;