SQL Server Security Fundamentals
File List
- sql-server-security-fundamentals.zip 23.9 MB
- 03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.mp4 14.5 MB
- 04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.mp4 12.2 MB
- 03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.mp4 10.6 MB
- 04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.mp4 9.2 MB
- 04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.mp4 8.7 MB
- 02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.mp4 8.3 MB
- 02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.mp4 8.3 MB
- 02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.mp4 7.5 MB
- 04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.mp4 6.7 MB
- 03. Understanding Authentication and Authorization/02. Understanding Authentication.mp4 5.6 MB
- 03. Understanding Authentication and Authorization/05. Authorization and Permissions.mp4 5.2 MB
- 04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.mp4 4.8 MB
- 04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.mp4 4.8 MB
- 02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.mp4 4.5 MB
- 02. Getting Started with SQL Server Security/06. Best Practices.mp4 4.3 MB
- 04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.mp4 4.3 MB
- 03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.mp4 4.2 MB
- 02. Getting Started with SQL Server Security/01. Introduction.mp4 3.8 MB
- 04. Understanding Principals, Objects, and Role-based Security/12. Summary.mp4 3.7 MB
- 04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.mp4 3.7 MB
- 03. Understanding Authentication and Authorization/07. Summary.mp4 3.2 MB
- 04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.mp4 2.7 MB
- 01. Course Overview/01. Course Overview.mp4 2.6 MB
- 04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.mp4 2.2 MB
- 03. Understanding Authentication and Authorization/01. Introduction.mp4 2.1 MB
- 04. Understanding Principals, Objects, and Role-based Security/01. Introduction.mp4 1.8 MB
- 03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.srt 10.1 KB
- 03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.srt 9.2 KB
- 02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.srt 7.7 KB
- 04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.srt 7.2 KB
- 04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.srt 6.9 KB
- 04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.srt 6.2 KB
- 03. Understanding Authentication and Authorization/05. Authorization and Permissions.srt 6.0 KB
- 03. Understanding Authentication and Authorization/02. Understanding Authentication.srt 5.7 KB
- 02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.srt 5.5 KB
- 04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.srt 5.4 KB
- 02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.srt 5.1 KB
- 04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.srt 5.0 KB
- 02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.srt 4.2 KB
- 04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.srt 4.1 KB
- 04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.srt 3.9 KB
- 02. Getting Started with SQL Server Security/01. Introduction.srt 3.5 KB
- 02. Getting Started with SQL Server Security/06. Best Practices.srt 3.4 KB
- 04. Understanding Principals, Objects, and Role-based Security/12. Summary.srt 3.2 KB
- 04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.srt 3.2 KB
- 03. Understanding Authentication and Authorization/07. Summary.srt 3.0 KB
- 04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.srt 2.3 KB
- 03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.srt 2.3 KB
- 04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.srt 2.2 KB
- 03. Understanding Authentication and Authorization/01. Introduction.srt 2.0 KB
- 01. Course Overview/01. Course Overview.srt 1.8 KB
- 04. Understanding Principals, Objects, and Role-based Security/01. Introduction.srt 1.7 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.