Given the ever-expanding role of a SQL Server database administrator in today's security landscape, it's critical to know how to keep data secure.
In this course, join the experts for a look at user authentication--who the users are--and authorization--what they are allowed to do. Plus, find out about auditing system access and data encryption, to make sure your data is properly secured.
You'll examine these topics through the lenses of various platforms, comparing what they look like in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
This computer science course introduces features and technologies for securing databases. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data. You will learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
Module 1: Authenticating Users and Connections
This module introduces the planning process to prepare for deployments of SQL Server and Azure SQL Database. It covers considerations for hardware, software, security, and availability.
Module 2: Authorizing Users to Access Resources
This module covers tasks and steps necessary to deploy SQL Server on Windows, on Linux, and in Azure SQL Database.
Module 3: Auditing Access to Data
This module covers auditing access to data with DML (data manipulation language) triggers, server audits and database audits.
Module 4: Encrypting Data
This module covers encrypting data with Transparent Data Encryption, Always Encrypted, and Dynamic Data Masking.
After the last module you will take the final exam, which accounts for 70% of your grade and will be combined with the homework assignments in each module to determine your overall score. You must achieve an overall score of 70% or higher to pass this course and earn a certificate.
Chris Randall and Geoff Allix