Microsoft SQL Server 2012: Security Management


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Microsoft SQL Server 2012 provides enhanced security features to ensure that each instance is secure. Using SQL Server 2012 security features, administrators can guarantee that access to a SQL Server instance is granted only to specified users, using either Windows Authentication or Mixed Mode Authentication by creating logins and then mapping the logins to the databases within the instance. Administrators also have the ability to encrypt a SQL Server instance using transparent data encryption (TDE) and to encrypt the data within a database using encryption certificates and asymmetric and symmetric keys. SQL Server 2012 also provides an auditing feature to audit the instance using server-level and database-level events, which can then be reviewed in log files. Policy-based management is another feature which provides administrators the means to specify policies throughout the SQL Server instance that objects need to adhere too to keep the database security and running efficiently. This course demonstrates how to create SQL Server logins, database users, schemas, roles, and how to grant permissions. It also addresses how to use encryption to protect a database and database data, as well as how to use the SQL Server Auditing feature and Policy-Based Management. This course is one of a series in the SkillSoft learning path that covers the objectives for the Microsoft SQL Server 2012 exam 70-462: Administering Microsoft SQL Server 2012 Databases. This exam is one of the requirements for the Microsoft Certified Solutions Associated (MCSA): SQL Server 2012 certification.

Target Audience
Professionals typically pursuing a career as a Database Administrator; individuals who do not work directly with SQL Server as part of their primary job but wish to show their breadth of technology experience, including developers and systems administrators among others; Database Administrators who as part of their daily task perform installation, maintenance, and configuration tasks

Expected Duration (hours)
2.5

Lesson Objectives

Microsoft SQL Server 2012: Security Management

  • describe the characteristics of resource security in SQL Server 2012
  • recognize how the fn_builtin_permissions function is used to obtain information on granted permissions
  • recognize how to create logins
  • describe the characteristics of credentials and roles
  • describe how to manage database users in SQL Server 2012
  • identify how data encryption is used in SQL Server 2012
  • sequence the steps involved in Transparent Data Encryption
  • manage access in SQL Server 2012
  • use data encryption in SQL Server 2012
  • match the SQL Server 2012 audit components to their descriptions
  • use the auditing features in SQL Server 2012
  • describe the characteristics of policy-based management in SQL Server 2012
  • recognize how to use policy-based management in SQL Server 2012
  • create an audit and an audit specification for a given scenario
  • use policy-based management in SQL Server 2012
  • Course Number:
    md_msdb_a04_it_enus

    Expertise Level
    Intermediate