Viewers: in countries Watching now:
Make sure your network's SQL Servers are secure, using best practices for physical, instance, network, and file system security. Gerry O'Brien introduces basics like SQL Server securables, principals, logins, users, and roles. Then learn how SQL Server checks permissions and use that information to create accounts and assign logins and roles. Last, Gerry explains common network security risks and steps you can take to secure network protocols.
(MUSIC) Hi. I'm Gerry O'Brien, and welcome to Securing SQL Server 2012. In this course, we'll take you through a look at all of the best practices for SQL Server, focused around physical security, instance security, network security, and file systems. And next we will take a look at SQL Server security basics, wehre we will focus on securables, principles, logins, users, and roles. After that we will introduce you to the SQL Server permissions and help you get it understanding of how SQL Server checks for permissions against users and accounts on your SQL Server system.
Next we will take a look at, at creating user accounts and assigning those to logins and roles. We'll also take a look at securing SQL Server on the network by helping you understand network security risks and using the Configuration Manager to secure SQL Server's network protocols. I hope you enjoy the course, so let's get started with Securing SQL Server 2012.
There are currently no FAQs about Securing SQL Server 2012.
Access exercise files from a button right under the course name.
Search within course videos and transcripts, and jump right to the results.
Remove icons showing you already watched videos if you want to start over.
Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.
Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.