MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Security and Encryption in SQL Server 2012 and 2014

Course Summary

Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this cour

  • +

    Course Syllabus

    ● Introduction to Security With SQL Server
        ◦ Course Introduction
        ◦ Why do we Need Security?
        ◦ What do we Need to Secure?
        ◦ There are More Risks Than Data Access
        ◦ What Tools do we Need?
        ◦ How Clients are Connecting to SQL Server
        ◦ Summary
    ● Server and System Security
        ◦ Module Introduction and System Account
        ◦ Other System Accounts
        ◦ Surface Area Configuration
        ◦ Opening Ports on Windows Firewall With the GUI
        ◦ Opening Ports on Windows Firewall by Script
        ◦ Enabling TCP on an Instance by Script
        ◦ Hiding an Instance in SQL Server Browser
        ◦ Fixing a TCP Port for an Instance
        ◦ Encrypting the Connection Between Client and Server Using SSL
        ◦ Using Extended Protection Against Authentication Relay Attacks
        ◦ Conclusion
    ● Penetration Testing
        ◦ Introduction
        ◦ Using Metasploit to Discover SQL Server Instance
        ◦ Cracking the SA Password
        ◦ Extracting Information From SQL Server Using Metasploit
        ◦ Summary
    ● Authentication and Logins
        ◦ Introduction
        ◦ Authentication and Permission Model
        ◦ Conclusion
    ● Roles and Permissions
        ◦ Introduction, Permissions
        ◦ Principals, Roles, Owners, ...
        ◦ What are Securables and How to Assign Permissions
        ◦ Fixed Server Roles
        ◦ System Database Users
        ◦ Database Roles
        ◦ Summary
    ● Fighting SQL Injections
        ◦ Introduction, What are SQL Injections?
        ◦ The Different Types of Injections
        ◦ Some SQL Injection Tools
        ◦ Installing and Using SQLMap
        ◦ How to Prevent Injection
        ◦ Detecting Common Injection Patterns
        ◦ Ownership Chaining
        ◦ Summary
    ● Encryption
        ◦ Introduction
        ◦ Service and Database Master Keys
        ◦ Transparent Data Encryption
        ◦ Non-reversible Encryption With Hashing
        ◦ Summary

Course Fee:
USD 29

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top