Find out what tools you need to follow along with the course, such as SQL Server, SQL Server Management Studio or SQL Operations Studio, and a sample database.
- [Instructor] The tools we're using in this course start out with SQL Server Developer Edition. I'm using SQL Server 2017 CU9, which I have patched, however you can use the base release of SQL Server 2017. It's fully free, you can download it from Microsoft.com as you see here, and just install it. You can also use SQL Server 2017 on Linux. The demos will behave the same, however your interface may be slightly different. I'm also using SQL Operations Studio. This is a relatively new open source tool from Microsoft that's built on top of Visual Studio code.
It runs on cross platform, so Windows, Mac, or Linux, and it interacts with SQL Server. It's not quite as fully-featured as SQL Server Management Studio, which you may have some experience with, and you will also see in some of our demos. Both of these tools are released monthly, so you want to make sure you're on the latest build 'cause there's cool new features in all of them. They're both also free. The big difference is SQL Server Management Studio's built on top of Visual Studio versus Op Studio being built on top of VS Code. You can do all of the demos that are included with this course in SQL Server Management Studio.
For the databases we're using in this course, we're mostly using a demo database that has a couple of tables that you can create from the DDL that I've supplied in the course scripts. However, for a couple of the demos, we're also using the AdventureWorks 2016 databases. Both AdventureWorks 2016 and AdventureWorks Data Warehouse 2016. You can get these from this URL here at Microsoft.com, or the Microsoft.com GitHub site.
- Building secure applications in SQL Server
- Configuring authentication in Azure AD
- Assigning user roles and privileges
- Building custom roles
- Creating contained users
- Protecting SQL Server from injection
- Identifying vulnerabilities
- Writing strong procedures
- Checking inputs
- Using dynamic parameterization
- Encrypting network connections
- Securing linked servers
- Configuring firewalls