Microsoft SQL Server 2012: Security Management

This course is included in our On-demand training solution.


Microsoft SQL Server 2012 provides enhanced security features to ensure that each instance is secure. Using SQL Server 2012 security features, administrators can guarantee that access to a SQL Server instance is granted only to specified users, using either Windows Authentication or Mixed Mode Authentication by creating logins and then mapping the logins to the databases within the instance. Administrators also have the ability to encrypt a SQL Server instance using transparent data encryption (TDE) and to encrypt the data within a database using encryption certificates and asymmetric and symmetric keys. SQL Server 2012 also provides an auditing feature to audit the instance using server-level and database-level events, which can then be reviewed in log files. Policy-based management is another feature which provides administrators the means to specify policies throughout the SQL Server instance that objects need to adhere too to keep the database security and running efficiently. This course demonstrates how to create SQL Server logins, database users, schemas, roles, and how to grant permissions. It also addresses how to use encryption to protect a database and database data, as well as how to use the SQL Server Auditing feature and Policy-Based Management. This course is one of a series in the SkillSoft learning path that covers the objectives for the Microsoft SQL Server 2012 exam 70-462: Administering Microsoft SQL Server 2012 Databases. This exam is one of the requirements for the Microsoft Certified Solutions Associated (MCSA): SQL Server 2012 certification.

Target Audience

Professionals typically pursuing a career as a Database Administrator; individuals who do not work directly with SQL Server as part of their primary job but wish to show their breadth of technology experience, including developers and systems administrators among others; Database Administrators who as part of their daily task perform installation, maintenance, and configuration tasks


Expected Duration

150 min.

Course Objectives

Resource Security in SQL Server 2012

  • describe the characteristics of resource security in SQL Server 2012
  • recognize how the fn_builtin_permissions function is used to obtain information on granted permissions
  • Creating Logins, Credentials, and Roles

  • recognize how to create logins
  • describe the characteristics of credentials and roles
  • Creating Schemas, Users, and Implementing Permissions

  • describe how to manage database users in SQL Server 2012
  • Data Encryption in SQL Server 2012

  • identify how data encryption is used in SQL Server 2012
  • sequence the steps involved in Transparent Data Encryption
  • Creating Resource Security Objects in SQL Server 2012

    Auditing SQL Server 2012

  • match the SQL Server 2012 audit components to their descriptions
  • use the auditing features in SQL Server 2012
  • Policy-based Management in SQL Server 2012

  • describe the characteristics of policy-based management in SQL Server 2012
  • recognize how to use policy-based management in SQL Server 2012
  • Using Auditing and Policy-Based Management