• Online, Self-Paced
Course Description

To protect data in a SQL Server Database environment, you need to ensure that only trusted users and applications have access to it. In this course, you will learn about configuring data access and permissions. This includes managing database object permissions, as well as creating and maintaining users and custom roles. In addition, this course covers configuring user options for Azure SQL Database, row-level security, and dynamic data masking. This course is one of a series in the Skillsoft learning path that covers the objectives for the 70-764: Administering a SQL Database Infrastructure exam.

Learning Objectives

Creating Users and Configuring Access

  • start the course
  • describe the types of database users and their purpose
  • create a database user using SQL Server Management Studio
  • create a database user using Transact-SQL
  • describe available server permissions
  • recognize the steps involved in granting a user access to a database and its objects
  • grant access to database objects
  • revoke access to database objects

 

Working With Roles

  • describe database-level roles and their purpose
  • describe server-level roles and their purpose
  • describe the purpose of application roles
  • recognize why you would use and how to create a custom role

 

Configuring Data Security

  • describe the purpose of row-level security and how to implement it
  • implement row-level security using T-SQL and predicates
  • describe the purpose of dynamic data masking
  • define dynamic data masking

 

Configuring Options for Azure SQL Database

  • describe the benefits and features of using Azure SQL Database
  • create and configure a new Azure SQL Database
  • connect to and manage an Azure SQL Database using a local instance of SSMS

 

Practice: Configuring Data Access

  • configure data access and permissions in SQL Server 2016

 

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.