Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Protecting SQL Server Data with Encryption
Module 0: Getting started
Who is this course for? (1:01)
Who is Greg? (1:14)
What will I learn in this course? (1:22)
Configuring your lab environment (12:24)
Following demo code
Module 1: Core encryption concepts
What are cryptography and encryption? (1:39)
Encryption vs obfuscation (2:08)
Symmetric key cryptography (1:55)
Public key cryptography (1:34)
Cryptographic algorithms (1:24)
Applying salt (1:52)
Digital envelopes and signatures (1:10)
Hashes (0:59)
Quiz 1: Core encryption concepts
Module 2: Working with certificates
Certificates defined (0:57)
Certificate authorities (3:12)
SSL (3:17)
Certificate requests (2:47)
Quiz 2: Working with certificates
Module 3: SQL Server keys and certificates
Supported certificate and key objects (1:22)
Service master key (4:40)
Database Master Key (2:20)
Supported encryption algorithms (1:27)
SQL Server symmetric keys (2:43)
SQL Server asymmetric keys (2:31)
SQL Server certificates (6:29)
Creating users from certificates (1:20)
Digitally signing stored procedures (6:17)
Moving a database with keys (2:29)
Lab 3: SQL Server keys and certificates
Lab 3: Solution
Quiz 3: SQL Server keys and certificates
Module 4: Using cell level encryption and hashing
CHECKSUM function (3:01)
HASHBYTES function (3:30)
Using cell level encryption (4:10)
Decryption keys (2:10)
Built-in encryption and decryption functions (1:09)
Lab 4: Using cell level encryption and hashing
Lab 4: Solution
Quiz 4: Using cell level encryption and hashing
Module 5: Using Transparent Database Encryption
Rationale for TDE (3:04)
Implementing TDE (4:14)
Application impacts (1:02)
Moving encrypted databases (2:45)
Feature compatibility (1:28)
Backup encryption (1:01)
Lab 5: Using Transparent Database Encryption
Lab 5: Solution
Quiz 5: Using Transparent Database Encryption
Module 6: Using Extensible Key Management
Extensible Key Management (1:19)
EKM key hierarchy (1:12)
Enabling an EKM provider (0:47)
Using Azure Key Vault for EKM (1:51)
Quiz 6: Using Extensible Key Management
Module 7: Using Always Encrypted
Rationale for Always Encrypted (1:09)
Typical Scenarios (1:28)
How Always Encrypted works (2:27)
Deterministic vs randomized encryption (1:20)
Associated permissions (1:15)
Limitations of Always Encrypted (1:23)
Using client drivers with Always Encrypted (1:08)
Refreshing cached parameter metadata (1:10)
Quiz 7: Using Always Encrypted
Module 8: Implementing Always Encrypted
Configuring Always Encrypted (0:58)
Creating a column master key (4:35)
Creating a column encryption key (2:43)
Defining encrypted columns (5:49)
Using the Always Encrypted Wizard (3:36)
Bulk loading encrypted data (1:09)
Lab 8: Implementing Always Encrypted
Lab 8: Video walk-through (2:24)
Quiz 8: Implementing Always Encrypted
Module 9: Using Always Encrypted with Secure Enclaves
Rationale for Always Encrypted with Secure Enclaves (1:59)
Secure Enclaves defined (0:39)
Available secure enclave providers (0:43)
Current limitations (0:40)
The need for attestation (1:07)
Configuring an attestation service (2:00)
Enabling in SQL Server (1:02)
Enclave-enabled keys and columns (0:51)
A quick tour of Always Encrypted with Secure Enclaves (7:27)
Lab 9: (Optional) Using Always Encrypted with Secure Enclaves
Quiz 9: Using Always Encrypted with Secure Enclaves
Module 10: Next steps
Summary and further steps (0:50)
How Always Encrypted works
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock