SQL Server 70-761: Querying Data with Transact-SQL Video

It is easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analysing their output. O’Reilly members get unlimited access to books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers. Join our community of 40 million+ learners, upskill with CPD UK accredited courses, explore career development tools and psychometrics – all for free. It assumes a basic understanding of databases and how they work, but it does not assume any prior experience with SQL Server 2016 or previous editions.

  • We have specifically designed this course to explore various fundamental aspects of the Microsoft SQL Server 2016 and analyse all relevant updates and enhancements in this updated release from Microsoft.
  • Take O’Reilly with you and learn anywhere, anytime on your phone and tablet.
  • It is also relevant application developers who deliver content from SQL Server databases.
  • This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
  • This module focuses on the architectural concepts, troubleshooting strategies and usage scenarios of Extended Events.

Perhaps more importantly, the automation of tasks helps to ensure that they are performed consistently, each time they are executed. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multiserver jobs. In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them.

Data Definition

However, if you regularly monitor the activity that occurs on the database server, you can deal with potential issues before they arise. SQL Server provides a number of tools SQL Server 2016 Lessons that you can use to monitor current activity and record details of previous activity. You need to become familiar with what each of the tools does and how to use them.

Solutions to these problems brought about the basic principles of the database systems we use today. These systems have also evolved to become computerised, harnessing the ever-improving power of different computer devices around us, including our phones and other mobile devices. Open your contacts on your mobile phone for a simple example of database utilisation. Recall how we stored phone numbers and addresses in separate phone books and address books. We have specifically designed this course to explore various fundamental aspects of the Microsoft SQL Server 2016 and analyse all relevant updates and enhancements in this updated release from Microsoft.

SQL Server String Functions

However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you’ll see how to restore user and system databases and how to implement point-in-time recovery. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level. One of the most important aspects of a database administrator’s role is ensuring that organisational data is reliably backed up so that, if a failure occurs, you can recover the data.