Lynda - Securing SQL Server 2012
File List
- 4. Creating and Assigning Logins and Roles/4.Assigning logins and roles for security.mp4 31.7 MB
- 4. Creating and Assigning Logins and Roles/3.Creating roles.mp4 20.5 MB
- 2. SQL Server Security Basics/4.Understanding and using roles.mp4 18.1 MB
- 4. Creating and Assigning Logins and Roles/2.Creating logins.mp4 16.8 MB
- 4. Creating and Assigning Logins and Roles/1.Understanding SQL Server authentication modes.mp4 16.4 MB
- 3. Understanding and Using SQL Server Permissions/3.Permissions applied to securables.mp4 16.1 MB
- 1. Security Best Practices for SQL Server/3.Network security considerations.mp4 15.4 MB
- 5. Securing SQL on the Network/3.Securing network protocols.mp4 14.2 MB
- 3. Understanding and Using SQL Server Permissions/2.Understanding how SQL Server checks permissions.mp4 12.9 MB
- 1. Security Best Practices for SQL Server/4.File system security.mp4 12.4 MB
- 2. SQL Server Security Basics/1.SQL Server securables.mp4 11.4 MB
- 2. SQL Server Security Basics/2.SQL Server principals.mp4 11.3 MB
- 2. SQL Server Security Basics/3.Manage logins and users.mp4 11.1 MB
- 1. Security Best Practices for SQL Server/2.SQL instance security.mp4 10.7 MB
- 0. Introduction/1.Welcome.mp4 9.0 MB
- 5. Securing SQL on the Network/1.Understanding network security risks.mp4 7.6 MB
- 5. Securing SQL on the Network/2.SQL Server Configuration Manager.mp4 6.3 MB
- 3. Understanding and Using SQL Server Permissions/1.SQL Server permissions.mp4 5.3 MB
- 1. Security Best Practices for SQL Server/1.Physical security.mp4 3.9 MB
- Conclusion/1.Next steps.mp4 3.6 MB
- 0. Introduction/2.What you should know before watching this course.mp4 776.0 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.