TorBT - Torrents and Magnet Links Search Engine

SQL Server Security Fundamentals

File Name
Size
01. Course Overview/01. Course Overview.mp4
2.6 MB
01. Course Overview/01. Course Overview.srt
1.8 kB
02. Getting Started with SQL Server Security/01. Introduction.mp4
3.8 MB
02. Getting Started with SQL Server Security/01. Introduction.srt
3.5 kB
02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.mp4
8.3 MB
02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.srt
7.7 kB
02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.mp4
4.5 MB
02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.srt
4.2 kB
02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.mp4
8.3 MB
02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.srt
5.5 kB
02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.mp4
7.5 MB
02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.srt
5.1 kB
02. Getting Started with SQL Server Security/06. Best Practices.mp4
4.3 MB
02. Getting Started with SQL Server Security/06. Best Practices.srt
3.4 kB
03. Understanding Authentication and Authorization/01. Introduction.mp4
2.1 MB
03. Understanding Authentication and Authorization/01. Introduction.srt
2.0 kB
03. Understanding Authentication and Authorization/02. Understanding Authentication.mp4
5.6 MB
03. Understanding Authentication and Authorization/02. Understanding Authentication.srt
5.7 kB
03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.mp4
11 MB
03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.srt
9.2 kB
03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.mp4
4.2 MB
03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.srt
2.3 kB
03. Understanding Authentication and Authorization/05. Authorization and Permissions.mp4
5.2 MB
03. Understanding Authentication and Authorization/05. Authorization and Permissions.srt
6.0 kB
03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.mp4
14 MB
03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.srt
10 kB
03. Understanding Authentication and Authorization/07. Summary.mp4
3.2 MB
03. Understanding Authentication and Authorization/07. Summary.srt
3.0 kB
04. Understanding Principals, Objects, and Role-based Security/01. Introduction.mp4
1.8 MB
04. Understanding Principals, Objects, and Role-based Security/01. Introduction.srt
1.7 kB
04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.mp4
4.8 MB
04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.srt
5.0 kB
04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.mp4
2.7 MB
04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.srt
2.2 kB
04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.mp4
9.2 MB
04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.srt
7.2 kB
04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.mp4
6.7 MB
04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.srt
5.4 kB
04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.mp4
4.3 MB
04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.srt
4.1 kB
04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.mp4
8.7 MB
04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.srt
6.9 kB
04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.mp4
3.7 MB
04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.srt
3.2 kB
04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.mp4
12 MB
04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.srt
6.2 kB
04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.mp4
2.2 MB
04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.srt
2.3 kB
04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.mp4
4.8 MB
04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.srt
3.9 kB
04. Understanding Principals, Objects, and Role-based Security/12. Summary.mp4
3.7 MB
04. Understanding Principals, Objects, and Role-based Security/12. Summary.srt
3.2 kB
sql-server-security-fundamentals.zip
24 MB