About this course
Given the ever-expanding role of a SQL Server database administrator in today's security landscape, it's critical to know how to keep data secure.
In this course, join the experts for a look at user authentication—who the users are—and authorization—what they are allowed to do. Plus, find out about auditing system access and data encryption, to make sure your data is properly secured.
You'll examine these topics through the lenses of various platforms, comparing what they look like in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
This computer science course introduces features and technologies for securing databases. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data. You will learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
What you'll learn
You will learn:
- How to authenticate connections and user logins
- How to authorize users to access resources
- How to audit access to data
- How to encrypt data at rest and over the wire
To complete the hands-on elements in this course, you will require an Azure subscription. You can sign up for a free Azure trial subscription (a valid credit card is required for verification, but you will not be charged for Azure services). Note that the free trial is not available in all regions. It is possible to complete the course and earn a certificate without completing the hands-on practices. Familiarity with database concepts and basic SQL query syntax. A willingness to learn actively and persevere when troubleshooting technical problems is essential.
Module 1: Authenticating Users and Connections
This module introduces the planning process to prepare for deployments of SQL Server and Azure SQL Database. It covers considerations for hardware, software, security, and availability.
Module 2: Authorizing Users to Access Resources
This module covers tasks and steps necessary to deploy SQL Server on Windows, on Linux, and in Azure SQL Database.
Module 3: Auditing Access to Data
This module covers auditing access to data with DML (data manipulation language) triggers, server audits and database audits.
Module 4: Encrypting Data
This module covers encrypting data with Transparent Data Encryption, Always Encrypted, and Dynamic Data Masking.
After the last module you will take the final exam, which accounts for 70% of your grade and will be combined with the homework assignments in each module to determine your overall score. You must achieve an overall score of 70% or higher to pass this course and earn a certificate.
Meet the instructors
Microsoft Certified IT Professional for SQL Server
Geoff Allix is a Microsoft SQL Server subject matter expert and professional content developer at Content Master ?a division of CM Group Ltd. Geoff is a Microsoft Certified IT Professional for SQL Server with extensive experience in designing and implementing database and BI solutions on SQL Server technologies. He has provided consultancy services to organizations seeking to implement and optimize database solutions, and contributed as a writer and subject matter expert to many SQL Server courses including the SQL Server 2014 Microsoft Official Curriculum courses.
Senior Content Developer, Microsoft Learning Experiences
Chris is a trainer, consultant, and author with 25 years of industry experience, specializing in SQL Server and the Microsoft data platform. He is a Microsoft Certified Solutions Expert for the SQL Server Data Platform and Business Intelligence, and works in the Microsoft Learning Experiences team as a senior content developer, where he plans and creates content for developers and data professionals who want to get the best out of Microsoft technologies.