SQL Server 2016 Advanced Security and Administration

Course

Online

£ 10 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Learn and implement advanced skills to be a SQL Server professionalSQL Server is a complex and feature rich platform that can requires knowledge and practice to extract optimum performance from an instance. This course will assist a database administrator in understanding the advanced security features that protect data within databases. You will also gain an advanced understanding in how to examine the activity on your system and better tune the database code to run efficiently.In SQL Server 2016 Advanced Security and Administration, we go beyond the basics of managing and securing a SQL Server instance. This course will look at the complex world of encryption and how you can enable this to protect data at rest as well as inside the database. Learn about Always Encrypted, where the data is always protected outside of the client system. The course will show how Dynamic Data Masking and Row-Level Security can be used to ensure that your clients only view the data they should be allowed to view. Since performance is important to all clients, the course covers the ways in which an administrator can determine what activity is taking place on a database through Extended Events and how to analyse and improve performance of queries using execution plans and the Query Store.In the end you will learn how to ensure predictable performance by analysing activity to find any performance problem, use detailed execution plans to tune query code, and use Query Store to prevent plan regressions.About the AuthorSteve Jones has been working with SQL Server since 1991. He has worked with all versions of SQL Server as a developer and DBA, in a variety of industries and companies. Over the last 25 years, he been greatly pleased with the enhancements and growth of the platform; he feels SQL Server is an outstanding database platform that is suited to a wide variety of needs and situations.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Learn to enable and administer Always Encrypted to secure data on the network and inside the database
Use Row-Level Security to selectively limit access to data by user
Configure Dynamic Data Masking to obfuscate data consistently in your applications
Enable encryption to protect data stored in SQL Server
Create Extended Event sessions that capture the activity on your database
Analyze activity on your system to troubleshoot issues your clients experience
Capture query execution plans to understand how the application is performing
Learn to read plans and tune the system based on the data clients need
Enable the Query Store to track query activity over time
Force query plans with the Query Store that can help ensure predictable performance

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Database training
  • SQL
  • Database
  • Server
  • Options
  • Access

Course programme

Advanced Security Features 6 lectures 52:06 The Course Overview This video gives an overview of entire course. Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
Advanced Security Features 6 lectures 52:06 The Course Overview This video gives an overview of entire course. Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
The Course Overview This video gives an overview of entire course. The Course Overview This video gives an overview of entire course. The Course Overview This video gives an overview of entire course. The Course Overview This video gives an overview of entire course. This video gives an overview of entire course. This video gives an overview of entire course. Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Transparent Data Encryption In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
In this video, we will implement TDE for a database.
  • Create key and certificate in master
  • Create DEK in database
  • Use ALTER command to enable encryption
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Always Encrypted In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
In this video, we will setup Always Encrypted.
  • Right click a table and select Encrypt Columns
  • Follow the wizard and perform encryption
  • Change the client connection string to add the encryption setting
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Column Level Encryption In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
In this video, we will use column level encryption to protect data in a table.
  • Create an asymmetric key in a database
  • Create a symmetric key, protected by the asymmetric key
  • Use the symmetric key to encrypt data in a column
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Row Level Security In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
In this video, we will setup Row Level Security for a table.
  • Create a function to be a security predicate
  • Assign the function to a security policy
  • Test access to a table based on security policy
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
Dynamic Data Masking In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
In this video, we will implement dynamic data masking on a table to hide data.
  • Alter a table’s column to add a masking function
  • Log in to a query window as an unprivileged user
  • View the data as an unprivileged user
Extended Events 5 lectures 46:52 Introduction to Extended Events In this video, we will show simple demo of XE.
  • Open SSMS and expand the Management folder
  • Expand the Extended Events folder
  • Right click a session and select Properties
Extended Event Sessions In this video, we will create a session from a template.
  • Right click sessions and select New Session Wizard
  • Follow the wizard
  • Start the session
Extended Event Targets In this video, we will add a target of an XE session.
  • Choose the session and right click
  • Choose the data storage item
  • Click add to add a new target
Extended Event Options In this video, we will change session options.
  • Choose the session and right click
  • Choose advanced
  • Change the retention or other options
Viewing and Analyzing XE Data In this video, we will view session data.
  • Right click a session target and choose View data
  • Right click a column in the grid and choose filter
  • Enter a filter value
Extended Events. 5 lectures 46:52 Introduction to Extended Events In this video, we will show simple demo of XE.
  • Open SSMS and expand the Management folder
  • Expand the Extended Events folder
  • Right click a session and select Properties
Extended Event Sessions In this video, we will create a session from a template.
  • Right click sessions and select New Session Wizard
  • Follow the wizard
  • Start the session
Extended Event Targets In this video, we will add a target of an XE session.
  • Choose the session and right click
  • Choose the data storage item
  • Click add to add a new target
Extended Event Options In this video, we will change session options.
  • Choose the session and right click
  • Choose advanced
  • Change the retention or other options
Viewing and Analyzing XE Data In this video, we will view session data.
  • Right click a session target and choose View data
  • Right click a column in the grid and choose filter
  • Enter a filter value
Introduction to Extended Events In this video, we will show simple demo of XE.
  • Open SSMS and expand the Management folder
  • Expand the Extended Events folder
  • Right click a session and select Properties
Introduction to Extended Events In this video, we will show simple demo of XE.
  • Open SSMS and expand the Management folder
  • Expand the Extended Events folder
  • Right click a session and select Properties
Introduction to Extended Events In this video, we will show simple demo of XE k on the top resource consuming queries
  • Click on a plan and then force the plan in the lower pane
  • Administering the Query Store In this video, we will configure the Query Store.
    • Right click...

    Additional information

    Learn to enable and administer Always Encrypted to secure data on the network and inside the database Use Row-Level Security to selectively limit access to data by user Configure Dynamic Data Masking to obfuscate data consistently in your applications Enable encryption to protect data stored in SQL Server Create Extended Event sessions that capture the activity on your database Analyze activity on your system to troubleshoot issues your clients experience Capture query execution plans to understand how the application is performing Learn to read plans and tune the system based on the data clients need Enable the Query Store to track query activity over time Force query plans with the Query Store that can help ensure predictable performance

    SQL Server 2016 Advanced Security and Administration

    £ 10 VAT inc.