Learn your way! Get started

SQL Server 2014, Part 5: Security Basics

with expert Don Kiely

Watch trailer

SQL Server 2014, Part 5: Security Basics Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 5/4/2015
Level Level Advanced
Runtime Runtime 1h 39m
Platform Platform Major browsers on Windows Major browsers on Windows Major browsers on Mac OSX Major browsers on Mac OSX Mobile Devices Mobile Devices
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware Included
Hands-on labs Hands-on labs Included
Sample code Sample code Included
Exams Exams Included

Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More

Course description

The SQL Server 2014: Security Basics course will show you the basics of SQL Server security by giving you an understanding of potential data threats and how SQL Servers design protects against them. You will then learn about SQL Server and Windows integrated authentication. Then see how SQL Server provides an authorization system to control access to data and objects.


This course assumes that you have at least a basic familiarity with the concept of relational databases and a basic understanding of what SQL Server is and the high-level tools in it, as well as how to create and manage objects using Management Studio.

Prepare for certification

This course will help you prepare for:
70-462 Administering Microsoft SQL Server 2012 Databases
70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012
70-461 Querying Microsoft SQL Server
70-461 Querying Microsoft SQL Server 2012
70-464 Developing Microsoft SQL Server 2012 Databases
70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012
70-467 Designing Business Intelligence Solutions with Microsoft SQL Server

This course will help you earn:
MCSA: SQL Server 2012
MCSE: Data Platform
MCSE: Business Intelligence

Meet the expert

Don Kiely Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant, specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Course outline

Introduction + Authentication

Introduction (15:01)
  • Introduction (00:38)
  • Security Overview (01:26)
  • The Threats (04:05)
  • Security Design Philosophy (03:26)
  • The Two Stages of Security (01:52)
  • Key SQL Server Security Terms (03:06)
  • Summary (00:25)
Authentication (18:57)
  • Introduction (00:36)
  • Authentication (02:39)
  • Integrated Authentication (01:17)
  • Security Settings (00:37)
  • Demo: Server Authentication (01:09)
  • Demo: Setting Validation (00:36)
  • Demo: Adding a User As a Login (03:16)
  • Demo: Assigning Permissions (03:56)
  • Demo: Adding Users Via Script (04:26)
  • Summary (00:20)
SQL Server Authentication (15:25)
  • Introduction (01:03)
  • Demo: Create SQL Login (02:22)
  • Windows and SQL Server Logins (01:18)
  • Beware of the sa Login (02:42)
  • Password Policy & Enforcement (01:45)
  • Demo: Account Policies (02:47)
  • Demo: Login Properties (02:46)
  • Summary (00:38)

Contained and Authorization

Contained Databases (20:42)
  • Introduction (01:03)
  • Database Authentication (00:49)
  • Demo: How to Enable Contained Databases (08:13)
  • Demo: Change Authorization (04:58)
  • Contained DB Authentication (05:05)
  • Summary (00:32)
Authorization (29:01)
  • Introduction (00:38)
  • Authorization (00:48)
  • Principals (03:56)
  • Fixed Server Roles (02:22)
  • Demo: Assigning a Login (03:36)
  • User-Defined Server Roles (01:16)
  • Demo: Create a New Server Role (06:00)
  • Fixed Database Roles (02:30)
  • Demo: Add a Back-up Operator (01:21)
  • The Public Role (01:00)
  • The dbo (Database Owner) Role (00:49)
  • User-Defined Database Roles (01:17)
  • Demo: Create a Database Role (01:28)
  • Securable Objects (01:34)
  • Summary (00:19)