Learn your way! Get started

SQL Server 2012, Part 6: Permissions and Data Protection

with expert Don Kiely


Watch trailer

SQL Server 2012, Part 6: Permissions and Data Protection Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 10/15/2012
Level Level Advanced
Runtime Runtime 1h 50m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware Included
Hands-on labs Hands-on labs Included
Sample code Sample code Included
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In the SQL Server 2012: Permissions and Data Protection course you will understand permissions in SQL Server and how they provide granular control over data and objects. Then you will learn how to provide a final layer of defense by encrypting data.

Prerequisites

The users should have a working knowledge of the Microsoft OS and Server environment but does not require any prior experience with Microsoft SQL Server or with database programming.

Learning Paths

This course is part of the following LearnNowOnline SuccessPaths™:
SQL Server Core

Meet the expert

Don Kiely Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.


Course outline



Permissions, Schemas, Metadata

Permissions (19:28)
  • Introduction (00:41)
  • Permissions (01:25)
  • Permission Types (04:15)
  • Permission Statements (02:01)
  • Granting Permissions (00:38)
  • Demo: Assigning Permissions (04:58)
  • Roles, Permissions and Schemas (02:54)
  • Demo: Granting Permissions (01:55)
  • Summary (00:38)
Default Schemas (17:15)
  • Introduction (00:52)
  • Default Schemas for Users (00:53)
  • Demo: How Schemas Work (07:18)
  • Default Schemas for Groups (00:49)
  • Demo: Potential Problems (06:40)
  • Summary (00:41)
Execution and Metadata (21:30)
  • Introduction (00:44)
  • Execution Context (02:23)
  • Ownership Chaining (01:13)
  • Changing the Execution Content (04:14)
  • Demo: Execution content (06:25)
  • Metadata Security (01:57)
  • Demo: Permissions and Metadata (04:17)
  • Summary (00:13)

Encryption

Data Encryption (21:29)
  • Introduction (00:35)
  • Data Encryption (03:28)
  • Encryption Keys (04:33)
  • Demo: How Encryption Works (10:30)
  • Key Management (01:48)
  • Summary (00:32)
Encrypting Data (30:48)
  • Introduction (00:40)
  • Demo: Table Creation (01:59)
  • Demo: Certificate Keys (08:45)
  • Demo: Asymmetric Keys (07:46)
  • Demo: Symmetric Keys (10:10)
  • Summary (01:26)