Make sure your network's SQL Servers are secure, using best practices for physical, instance, network, and file system security.
- View Offline
- [Voiceover] Hi, I'm Gerry O'Brien, and welcome to Securing SQL Server 2012. In this course, we'll take you through a look at all of the security best practices for SQL Server, focused around physical security, instance security, network security, and file systems. Next, we'll take a look at SQL Server security basics, where we'll focus on securables, principles, logins, users, and roles. After that, we'll introduce you to the SQL Server permissions, and help you get an understanding of how SQL Server checks for permissions against users and accounts on your SQL Server system.
Next, we'll take a look at creating user accounts and assigning those to logins and roles. We'll also take a look at securing SQL Server on the network, by helping you understand network security risks, and using the configuration manager to secure SQL Server's network protocols. I hope you enjoy the course, so let's get started with Securing SQL Server 2012.
- Understanding security best practices
- Managing logins and users
- Understanding how SQL Server checks permissions
- Creating and assigning logins and roles
- Securing SQL on the network