Securing SQL Server 2012
Make sure your network's SQL Servers are secure, using best practices for physical, instance, network, and file system security. Gerry O'Brien introduces basics like SQL Server securables, principals, logins, users, and roles. Then learn how SQL Server checks permissions and use that information to create accounts and assign logins and roles. Last, Gerry explains common network security risks and steps you can take to secure network protocols.
- Understanding security best practices
- Managing logins and users
- Understanding how SQL Server checks permissions
- Creating and assigning logins and roles
- Securing SQL on the network
- [Voiceover] Hi, I'm Gerry O'Brien, and welcome to Securing SQL Server 2012. In this course, we'll take you through a look at all of the security best practices for SQL Server, focused around physical security, instance security, network security, and file systems. Next, we'll take a look at SQL Server security basics, where we'll focus on securables, principles, logins, users, and roles. After that, we'll introduce you to the SQL Server permissions, and help you get an understanding of how SQL Server checks for permissions against users and accounts on your SQL Server system.
Next, we'll take a look at creating user accounts and assigning those to logins and roles. We'll also take a look at securing SQL Server on the network, by helping you understand network security risks, and using the configuration manager to secure SQL Server's network protocols. I hope you enjoy the course, so let's get started with Securing SQL Server 2012.
SQL Server 2012 New Features81,216 Views
Installing SQL Server 2012127,627 Views
SQL Server: Triggers, Stored Procedures, and Functions358,466 Views
SQL Server Integration Services182,531 Views
Designing Database Solutions for SQL Server 201275,068 Views
SQL Server 2008 Essential Training1,660,895 Views
PHP with MySQL Essential Training4,274,773 Views
SQL Essential Training2,247,235 Views
Deke's Techniques1,565,488 Views