Learn your way! Get started

SQL Server 2014, Part 5: Security Basics

with expert Don Kiely

Watch trailer

SQL Server 2014, Part 5: Security Basics Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 5/4/2015
Level Level Advanced
Runtime Runtime 1h 39m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware Included
Hands-on labs Hands-on labs Included
Sample code Sample code Included
Exams Exams Included

Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More

Course description

The SQL Server 2014: Security Basics course will show you the basics of SQL Server security by giving you an understanding of potential data threats and how SQL Servers design protects against them. You will then learn about SQL Server and Windows integrated authentication. Then see how SQL Server provides an authorization system to control access to data and objects.


This course assumes that you have at least a basic familiarity with the concept of relational databases and a basic understanding of what SQL Server is and the high-level tools in it, as well as how to create and manage objects using Management Studio.

Learning Paths

This course will help you prepare for the following certifications and exams:
MCSE: Business Intelligence
MCSA: SQL Server 2012/2014
MCSE: Data Platform
70-462: Administering Microsoft SQL Server 2012/2014 Databases
70-461: Querying Microsoft SQL Server 2012/2014

This course is part of the following LearnNowOnline SuccessPaths™:
SQL Server Core

Meet the expert

Don Kiely Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Course outline

Introduction + Authentication

Introduction (15:01)
  • Introduction (00:38)
  • Security Overview (01:26)
  • The Threats (04:05)
  • Security Design Philosophy (03:26)
  • The Two Stages of Security (01:52)
  • Key SQL Server Security Terms (03:06)
  • Summary (00:25)
Authentication (18:57)
  • Introduction (00:36)
  • Authentication (02:39)
  • Integrated Authentication (01:17)
  • Security Settings (00:37)
  • Demo: Server Authentication (01:09)
  • Demo: Setting Validation (00:36)
  • Demo: Adding a User As a Login (03:16)
  • Demo: Assigning Permissions (03:56)
  • Demo: Adding Users Via Script (04:26)
  • Summary (00:20)
SQL Server Authentication (15:25)
  • Introduction (01:03)
  • Demo: Create SQL Login (02:22)
  • Windows and SQL Server Logins (01:18)
  • Beware of the sa Login (02:42)
  • Password Policy & Enforcement (01:45)
  • Demo: Account Policies (02:47)
  • Demo: Login Properties (02:46)
  • Summary (00:38)

Contained and Authorization

Contained Databases (20:42)
  • Introduction (01:03)
  • Database Authentication (00:49)
  • Demo: How to Enable Contained Databases (08:13)
  • Demo: Change Authorization (04:58)
  • Contained DB Authentication (05:05)
  • Summary (00:32)
Authorization (29:01)
  • Introduction (00:38)
  • Authorization (00:48)
  • Principals (03:56)
  • Fixed Server Roles (02:22)
  • Demo: Assigning a Login (03:36)
  • User-Defined Server Roles (01:16)
  • Demo: Create a New Server Role (06:00)
  • Fixed Database Roles (02:30)
  • Demo: Add a Back-up Operator (01:21)
  • The Public Role (01:00)
  • The dbo (Database Owner) Role (00:49)
  • User-Defined Database Roles (01:17)
  • Demo: Create a Database Role (01:28)
  • Securable Objects (01:34)
  • Summary (00:19)