Security and Encryption in SQL Server 2012 and 2014
Pluralsight
Course Summary
Learn how to secure SQL Server: Access, authentication, permissions, SQL injections, encryption and much more.
-
+
Course Description
Security in SQL Server is often overlooked. Companies tend to concentrate on availability and performance, but a database system often stores virtually all of a company's valuable and confidential data. So what happens if this data is stolen? In this course, we will cover all areas you need to protect to effectively secure SQL Server. It means system and network protection, user authentication, permissions on the objects and data, and data encryption. We will also use some penetration testing frameworks to show you how attacks are performed against SQL Server through various types of exploits, including SQL injection. The course is focused on SQL Server 2012 and 2014, but most of the information applies to all versions from SQL Server 2005 onward.
-
+
Course Syllabus
Introduction to Security With SQL Server- 24m 39s
—Course Introduction 1m 39s
—Why do we Need Security? 1m 46s
—What do we Need to Secure? 2m 2s
—Demo: Stealing Database Files 3m 53s
—There are More Risks Than Data Access 3m 38s
—What Tools do we Need? 2m 24s
—How Clients are Connecting to SQL Server 2m 26s
—Demo: Client Connections 5m 1s
—Summary 1m 44sServer and System Security- 1h 2m
—Module Introduction and System Account 6m 21s
—Other System Accounts 8m 25s
—Surface Area Configuration 7m 43s
—Opening Ports on Windows Firewall With the GUI 3m 7s
—Opening Ports on Windows Firewall by Script 8m 9s
—Enabling TCP on an Instance by Script 6m 14s
—Hiding an Instance in SQL Server Browser 3m 29s
—Fixing a TCP Port for an Instance 4m 56s
—Encrypting the Connection Between Client and Server Using SSL 8m 30s
—Using Extended Protection Against Authentication Relay Attacks 3m 46s
—Conclusion 2m 7sPenetration Testing- 18m 33sAuthentication and Logins- 39m 51sRoles and Permissions- 52m 50sFighting SQL Injections- 1h 1mEncryption- 1h 5m