Security and Encryption in SQL Server 2012 and 2014
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to secure SQL Server: Access, authentication, permissions, SQL injections, encryption and much more.
Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this course, we will cover all areas you need to protect to effectively secure SQL Server. It means system and network protection, user authentication, permissions on the objects and data, and data encryption. We will also use some penetration testing frameworks to show you how attacks are performed against SQL Server through various types of exploits, including SQL injection. The course is focused on SQL Server 2012 and 2014, but most of the information applies to all versions from SQL Server 2005 onward.
Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this course, we will cover all areas you need to protect to effectively secure SQL Server. It means system and network protection, user authentication, permissions on the objects and data, and data encryption. We will also use some penetration testing frameworks to show you how attacks are performed against SQL Server through various types of exploits, including SQL injection. The course is focused on SQL Server 2012 and 2014, but most of the information applies to all versions from SQL Server 2005 onward.
Syllabus
- Introduction to Security With SQL Server 24mins
- Server and System Security 62mins
- Penetration Testing 18mins
- Authentication and Logins 39mins
- Roles and Permissions 52mins
- Fighting SQL Injections 61mins
- Encryption 65mins
Taught by
Rudi Bruchez
Related Courses
Access Control Concepts(ISC)² via Coursera AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru Google Cloud Identity and Access Management (IAM) Deep Dive
A Cloud Guru Google Kubernetes Engine Deep Dive
A Cloud Guru HashiCorp Vault
A Cloud Guru