Security and Encryption in SQL Server 2012 and 2014
Offered By: Pluralsight
Course Description
Overview
Learn how to secure SQL Server: Access, authentication, permissions, SQL injections, encryption and much more.
Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this course, we will cover all areas you need to protect to effectively secure SQL Server. It means system and network protection, user authentication, permissions on the objects and data, and data encryption. We will also use some penetration testing frameworks to show you how attacks are performed against SQL Server through various types of exploits, including SQL injection. The course is focused on SQL Server 2012 and 2014, but most of the information applies to all versions from SQL Server 2005 onward.
Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this course, we will cover all areas you need to protect to effectively secure SQL Server. It means system and network protection, user authentication, permissions on the objects and data, and data encryption. We will also use some penetration testing frameworks to show you how attacks are performed against SQL Server through various types of exploits, including SQL injection. The course is focused on SQL Server 2012 and 2014, but most of the information applies to all versions from SQL Server 2005 onward.
Syllabus
- Introduction to Security With SQL Server 24mins
- Server and System Security 62mins
- Penetration Testing 18mins
- Authentication and Logins 39mins
- Roles and Permissions 52mins
- Fighting SQL Injections 61mins
- Encryption 65mins
Taught by
Rudi Bruchez
Related Courses
Hacking and PatchingUniversity of Colorado System via Coursera Software Design Threats and Mitigations
University of Colorado System via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Identifying Security Vulnerabilities
University of California, Davis via Coursera Web Application Security Testing with Burp Suite
Coursera Project Network via Coursera