Cheers to the End of January with 25% Off ALL Certs & Diplomas!

Claim My Discount!

SQL Server 2014: Security Fundamentals

This free online course teaches about the fundamentals of SQL Server 2014 and the steps for creating secured databases.

Publisher: Workforce Academy Partnership
This free online course will take learners through the security fundamentals of SQL Server 2014, as well as teach them about authentication and contained databases. The course will explain to learners how to design secure databases, taking into account the full range of security options. By the end of the course, learners will become more acquainted with the theory and implementation of secure server management, authorization and authentication.
SQL Server 2014: Security Fundamentals
  • Duration

    3-4 Hours
  • Students

  • Accreditation






View course modules


This free online course on SQL Server 2014 is a fundamental level course that begins by explaining the reason and importance of storing your data in a relational database. The course describes how security is the most important feature of the SQL server. You will learn about essential security concepts in SQL  Server 2014 and how the SQL server keeps your data safe. The typical way of finding out how digital resources can be accessed by anyone is through the use of a username and password. The course describes authentication as the process of verifying that a principal is who he or she claims to be. The course explains how the SQL server uniquely identifies principals in order to authorize access to a database. When you use SQL Server login for authentication, clients applications have to provide a valid username and password to connect to the database. The course explains why SQL Server authentication is preferred to windows authentication. You will learn about the procedures used in creating a SQL server login. 

Contained databases is an interesting part of SQL Server 2014. Contained databases implement new security features and elements. The course explains how contained databases solve the problem of moving a database from one server to another. Authentication is an important part required for accessing the important parts of a database. You will learn about the roles of authorization and authentication to database objects. This study explains the concept of Principals which are users or processes allowed to access secured objects. Newer versions of SQL server implements a rich, granular permission scheme. This course explains how to implement permissions to keep the server and the database secured. The course describes how SQL permission gives the principal some kind of access to a securable object. A schema is essentially a container for elements within the database. The course explains how SQL server allows for the assignment of default schemas for users and groups. The course explains how SQL servers are not able to automatically create a schema with the same name as the user. The principle of least privilege is a major step in securing a database. The course describes the few common permissions available in SQL server. You will learn about the three types of statements that cover the kinds of permissions that can be assigned: GRANT, REVOKE and DENY.

Finally, this course explains how the SQL server follows a procedure to ensure users have permissions to execute codes. The course also describes the concept of Exception which exists when a code owner has permissions on underlying objects. One of the most important layers that can be applied to any digital asset is encryption. The course explains the security features built into the SQL server that can be used to protect data objects. The course explains the process of encrypting data by the use of a key or password. You will learn how important data is usually encrypted. You will study how to encrypt data containing sensitive information. Security issues associated with a database is quite common in SQL Servers. A security mechanism that can help you understand how to attain the highest level of security for your data is called defence in-depth SQL servers. The course takes you through how most SQL servers have rich support for data encryption. The course also describes the types of encryption keys used in database systems. Start this course today and improve your skills in designing much more secured databases. 

Start Course Now