Every registration supports local education. TrainUp Gives Back

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
  • calendar Image 6-12 Months
    To Complete


Microsoft SQL Server 2012 provides enhanced security features to ensure that each instance is secure. Using SQL Server 2012 security features, administrators can guarantee that access to a SQL Server instance is granted only to specified users, using either Windows Authentication or Mixed Mode Authentication by creating logins and then mapping the logins to the databases within the instance. Administrators also have the ability to encrypt a SQL Server instance using transparent data encryption (TDE) and to encrypt the data within a database using encryption certificates and asymmetric and symmetric keys. SQL Server 2012 also provides an auditing feature to audit the instance using server-level and database-level events, which can then be reviewed in log files. Policy-based management is another feature which provides administrators the means to specify policies throughout the SQL Server instance that objects need to adhere too to keep the database security and running efficiently. This course demonstrates how to create SQL Server logins, database users, schemas, roles, and how to grant permissions. It also addresses how to use encryption to protect a database and database data, as well as how to use the SQL Server Auditing feature and Policy-Based Management. This course is one of a series in the SkillSoft learning path that covers the objectives for the Microsoft SQL Server 2012 exam 70-462: Administering Microsoft SQL Server 2012 Databases. This exam is one of the requirements for the Microsoft Certified Solutions Associated (MCSA): SQL Server 2012 certification.

Learning Objectives
  • Describe the characteristics of resource security in SQL Server 2012
  • Recognize how the fn_builtin_permissions function is used to obtain information on granted permissions
  • Recognize how to create logins
  • Describe the characteristics of credentials and roles
  • Describe how to manage database users in SQL Server 2012
  • Identify how data encryption is used in SQL Server 2012
  • Sequence the steps involved in Transparent Data Encryption
  • Manage access in SQL Server 2012
  • Use data encryption in SQL Server 2012
  • Match the SQL Server 2012 audit components to their descriptions
  • Use the auditing features in SQL Server 2012
  • Describe the characteristics of policy-based management in SQL Server 2012
  • Recognize how to use policy-based management in SQL Server 2012
  • Create an audit and an audit specification for a given scenario
  • Use policy-based management in SQL Server 2012
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.