• Online, Self-Paced
Course Description

Determining how to secure databases in SQL Server 2016 is one of the most important parts of a deployment strategy. This course covers how to implement firewalls, authentication, and auditing to ensure Microsoft Azure SQL database security. In addition, this course covers dynamic data masking, a feature in SQL Server 2016 that can be used to limit exposure to sensitive data. This course is one of a series of courses that cover the objectives for the 20765A: Provisioning SQL Databases exam.

Learning Objectives

Securing Microsoft Azure SQL Databases

  • start the course
  • describe the benefits of enabling a SQL Server firewall
  • demonstrate how to configure SQL Server 2016 firewall rules
  • demonstrate how to manage existing firewall rules in the Azure portal
  • explain how to restrict and secure a connection to a SQL Server database
  • explain how the connection process redirects machines to a different IP address and port
  • describe how to implement authentication in SQL Server 2016
  • describe considerations involving the implementation of contained database users
  • explain the restrictions involving managing logins and users
  • describe how to implement SQL database auditing
  • explain how authorization can be used when securing SQL Server databases

Dynamic Data Masking

  • describe dynamic data masking
  • describe the four types of dynamic data masks
  • explain how to implement dynamic data masking policies and permissions
  • demonstrate how to query masked columns in SQL Server 2016
  • explain the limitations and restrictions of dynamic data masking
  • demonstrate how to create a dynamic data mask
  • demonstrate how to configure dynamic data masking using the Azure portal
  • demonstrate how to configure dynamic data masking using PowerShell

Practice: Configuring Firewall Rules

  • configure firewall rules in Azure SQL Database

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.