Learn your way! Get started

SQL Server 2008: Installing, Querying, and Security

with expert Don Kiely


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 12/8/2008
Level Advanced
Runtime 11h 45m
Closed captioning N/A
Transcript N/A
eBooks / courseware Included
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course, you will learn about the components that make up the comprehensive SQL Server 2008 product and the various editions that Microsoft makes available, so that you can select the right one. You will learn about installation and upgrade issues, about some of the many configuration choices available to customize it to your needs and environment, as well as how to tweak it after installation. Then you will learn how to work with database objects and data, using Management Studio and other tools, as well as Transact SQL (T-SQL), the programming language of SQL server. You will learn about the features in T-SQL for querying, inserting, updating, and deleting data, as well as the rich support in T-SQL for various data-based operations. The course finishes up with a comprehensive look at security, both to help you secure your server and data from unauthorized use as well as to avoid security hurdles as you administer and develop applications that use the server and its data.

Learning Paths

This course will help you prepare for the following certification and exam:
MCTS: SQL Server 2008, Database Development
70-433: TS: Microsoft SQL Server 2008, Database Development

Meet the expert

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Course outline



Module 1

Tour of SQL 08 (32:09)
  • Introduction (00:34)
  • Editions (03:29)
  • Server Components (02:44)
  • Management Tools (02:38)
  • Documentation (00:52)
  • Feature Pack (01:24)
  • SSMS (00:46)
  • Demo: SSMS (19:14)
  • Summary (00:24)
Server Activity (36:56)
  • Introduction (00:50)
  • Demo: Activity Monitor (14:27)
  • Tables Queries Views (00:28)
  • Demo: Table Designer (03:15)
  • Demo: Template Explorer (08:25)
  • SSIS (03:03)
  • BIDS (00:54)
  • Demo: BIDS (02:09)
  • Reporting Services (01:44)
  • SSAS (01:07)
  • Summary (00:30)

Module 2

Installation Preparation (28:37)
  • Introduction (00:57)
  • Requirements (03:21)
  • Network Software (00:25)
  • Service Accounts (04:28)
  • Multiple Instances (02:16)
  • Scenarios (02:15)
  • Named Instances (00:44)
  • Instance Components (01:56)
  • Upgrading (04:49)
  • Upgrade Advisor (01:25)
  • Demo: Upgrade Advisor (05:22)
  • Summary (00:34)
Installation Steps (21:11)
  • Introduction (01:20)
  • Demo: Installation Center (01:10)
  • Setup Support Rules (00:47)
  • Product Key (01:51)
  • Feature Selection (01:57)
  • Instance Config (00:52)
  • Disk Space (00:28)
  • Server Configuration (03:55)
  • Database Engine (05:09)
  • Error Reporting (01:33)
  • Ready to Install (01:40)
  • Summary (00:25)
Configuring (22:49)
  • Introduction (00:51)
  • Demo: Server Services (02:14)
  • Server Protocols (00:52)
  • SQL Native Client (01:14)
  • Management Studio (00:28)
  • Server Properties (03:34)
  • Memory Options (02:48)
  • Processors (02:12)
  • Security (01:40)
  • Connections (02:26)
  • Database Settings (01:34)
  • Advanced (01:51)
  • Permissions (00:34)
  • Summary (00:25)

Module 3

Relational Design (37:46)
  • Introduction (01:35)
  • Design Principles (00:44)
  • Key Terms (02:32)
  • Relational Theory (01:07)
  • Surrogate Keys (01:50)
  • Demo: DB Design (01:32)
  • Data Normalization (00:32)
  • First Normal Form (03:17)
  • Second Normal Form (02:58)
  • Third Normal Form (01:42)
  • Computed Columns (00:43)
  • Key Dependance (00:49)
  • Postal Lookup Tables (00:40)
  • Beyond Normal Forms (00:54)
  • Referentail Integrity (01:40)
  • Relationships (03:12)
  • One-to-One (03:08)
  • Enfrorcing Integrity (00:58)
  • Cascading (00:52)
  • Cascading Updates (00:41)
  • Cascading Deletes (00:55)
  • Cascading Actions (01:24)
  • Beyond Normalization (02:01)
  • Business Rules (01:19)
  • Summary (00:28)
Implementation (17:48)
  • Introduction (00:43)
  • Database Storage (01:19)
  • Storage (02:47)
  • Data Integrity (01:40)
  • Recovery Models (01:28)
  • Demo: Implementation (04:51)
  • Rules for Identifiers (01:50)
  • Demo: DB Properties (02:03)
  • Summary (01:03)

Module 4

Data Types (01:02:41)
  • Introduction (00:55)
  • Charater-based (03:13)
  • Numeric Data (04:18)
  • Date and Time (05:11)
  • Binary Types (01:37)
  • Identifier Types (03:11)
  • sql_variant (00:56)
  • Variable-only (01:49)
  • XML Type (01:42)
  • System SQLCLR Types (02:26)
  • Demo: Data Types (10:17)
  • Creating Constraints (03:50)
  • Demo: Constraints (08:12)
  • Triggers (03:15)
  • Creating Indexes (00:33)
  • Demo: Index (10:31)
  • Summary (00:37)
Data Selection Queries (36:00)
  • Introduction (01:35)
  • Transact-SQL (02:14)
  • Schemas and Naming (03:34)
  • Demo: T-SQL Code (18:08)
  • Three-Valued Logic (02:31)
  • Demo: Nulls (07:31)
  • Summary (00:25)

Module 5

Sorting (43:53)
  • Introduction (01:13)
  • Demo: Order By (02:11)
  • Group By Clause (00:57)
  • Aggregate Functions (01:14)
  • Demo: Count Rows (07:42)
  • Demo: Top (02:13)
  • Joining Tables (01:09)
  • Demo: Join Tables (13:39)
  • Demo: Outer Join (05:54)
  • Demo: Inner and Outer (07:09)
  • Summary (00:27)
Modifying Data (35:15)
  • Introduction (01:17)
  • Inserting Data (00:27)
  • Demo: INSERT (19:14)
  • Temporary Tables (01:44)
  • Demo: Temp Tables (02:31)
  • Uses for Temp Tables (02:24)
  • Demo: Global Temps (07:03)
  • Summary (00:33)

Module 6

Updating Data (32:50)
  • Introduction (00:42)
  • Demo: Update Statement (08:05)
  • Demo: With Transaction (02:12)
  • Demo: Deleting Data (03:28)
  • Transaction Isolation (02:20)
  • Isolation Levels (04:12)
  • Blocking and Deadlocks (01:46)
  • Deadlocks (03:08)
  • Demo: Isolation Levels (02:11)
  • Snapshot Isolation (01:54)
  • Caveats (00:38)
  • Demo: Snapshot Isolation (01:42)
  • Summary (00:26)
Management Studio (31:18)
  • Introduction (01:23)
  • Demo: Connecting (03:25)
  • Configure Options (08:16)
  • Customize Toolbars (00:35)
  • Menu Items (03:46)
  • Query Designer (00:55)
  • Projects and Solutions (04:17)
  • Object Explorer (02:06)
  • Filter Nodes (02:15)
  • View Dependencies (01:10)
  • Object Details (01:21)
  • Designers (01:11)
  • Summary (00:32)

Module 7

Query Editor (44:42)
  • Introduction (00:53)
  • Demo: Overview (03:06)
  • Editing Options (07:07)
  • Script Table as (01:18)
  • Stored Procedure (02:19)
  • Debuging (07:07)
  • Template Explorer (03:27)
  • Execution Plans (04:08)
  • Results to a File (01:06)
  • SQLCMD Mode (01:04)
  • New Project (04:59)
  • Working Offline (03:37)
  • Books Online (00:36)
  • Demo: Help Features (03:19)
  • Summary (00:30)
Transact SQL (31:37)
  • Introduction (00:32)
  • T-SQL Extenstions (02:40)
  • Batches and Scripts (00:52)
  • Demo: Batches (10:45)
  • Data Type Precedence (01:08)
  • Demo: Converting Types (06:00)
  • Built-In Functions (01:41)
  • Working with Nulls (01:34)
  • Demo: Nulls (05:50)
  • Summary (00:30)

Module 8

Handling Functions (35:29)
  • Introduction (00:52)
  • Demo: ISNUMERIC (02:05)
  • Using RAND (02:02)
  • ROUND (03:13)
  • REPLACE (01:46)
  • STUFF (00:53)
  • LEN LEFT RIGHT (01:19)
  • SUBSTRING (00:54)
  • CHARINDEX (02:22)
  • PATINDEX (02:54)
  • SPACE (01:01)
  • CHAR and ASCII (00:51)
  • LOWER and UPPER (03:17)
  • LTRIM and RTRIM (00:53)
  • GETDATE (00:17)
  • MONTH DATE YEAR (00:12)
  • DATEPART (01:02)
  • DATENAME (00:29)
  • DATE Math (02:19)
  • Global Functions (06:05)
  • Summary (00:32)
Controlling Flow (23:11)
  • Introduction (00:49)
  • Demo: IF...ELSE (01:14)
  • BEGIN...END (01:30)
  • GOTO (02:02)
  • RETURN (01:37)
  • CASE (06:13)
  • WHILE (01:49)
  • WAITFOR (01:49)
  • Ranking Results (01:22)
  • Demo: Ranking (04:14)
  • Summary (00:26)

Module 9

Security (30:56)
  • Introduction (01:42)
  • The Threats (04:02)
  • Security Philosophy (03:45)
  • Two Stages (01:55)
  • Security Terms (03:12)
  • Authentication (03:20)
  • Windows Integrated (01:34)
  • Configure Settings (01:20)
  • Demo: SQL Security (09:27)
  • Summary (00:35)
SQL Server Authentication (14:33)
  • Introduction (01:21)
  • Demo: New Logins (02:33)
  • Windows and SQL Logins (01:13)
  • sa Login (02:07)
  • Password Policy (01:46)
  • Demo: Passwords (04:56)
  • Summary (00:35)
Authorization (21:05)
  • Introduction (01:34)
  • Principals (03:11)
  • Server Roles (02:26)
  • Demo: Server Roles (02:37)
  • Database Roles (02:45)
  • Demo: Database Roles (01:54)
  • Special Roles (03:38)
  • Demo: Special Roles (00:58)
  • Securable Objects (01:36)
  • Summary (00:21)

Module 10

Permissions (39:23)
  • Introduction (01:39)
  • Permission Types (04:48)
  • Permission Statements (02:23)
  • Granting Permissions (00:39)
  • Demo: Permissions (05:08)
  • Roles Permission... (03:03)
  • Demo: Schemas (02:21)
  • Execution Context (02:32)
  • Ownership Chaining (01:13)
  • Execution Context (03:34)
  • Demo: Execution Context (06:07)
  • Metadata Security (01:42)
  • Demo: Metadata (03:44)
  • Summary (00:23)
Encryption (24:54)
  • Introduction (03:50)
  • Encryption Keys (04:33)
  • Key Management (02:22)
  • Demo: Encryption (12:36)
  • Summary (01:32)