Get our Bestselling Ethical Hacker Course V13 for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

Microsoft 70-764 – SQL Server 2016 Administration

Course Level: Beginner
Duration: 21 Hrs 14 Min
Total Videos: 106 On-demand Videos

Master SQL Server 2016 administration skills including security, backup strategies, and auditing to confidently manage and protect enterprise data environments.

Learning Objectives

01

Understand and apply encryption configurations, including cell-level, transparent data, and backup encryption.

02

Learn to configure data access and permissions, create and maintain users, and manage database object permissions.

03

Understand and perform auditing tasks on SQL Server and Azure SQL Server.

04

Develop and implement a comprehensive backup strategy, including managing large databases and setting up alert systems.

05

Master the process of database restoration, including piecemeal restores, page recovery, and point-in-time recovery.

06

Learn to manage database integrity through consistency checks and corruption recovery strategies.

07

Gain skills in monitoring database activity, identifying problematic sessions, and configuring data collectors.

08

Effectively manage and monitor SQL Server instances, implement log shipping, and set up Always On Availability Groups.

Course Description

Microsoft® 70-764 SQL Server 2016 Administration is the course you take when you need to move from “I can get into SQL Server” to “I can actually run this platform responsibly.” That difference matters. Anyone can create a database and run a few queries. A real administrator is the person who controls access, protects data, designs backups that survive failure, audits activity, and keeps the system recoverable when something goes wrong at 2:00 a.m. This course is built around those responsibilities.

I built this training to help you learn the administration work that organizations depend on every day. You will not be memorizing trivia for its own sake. You will be working through the operational tasks that define SQL Server administration: encryption, permissions, auditing, backup strategy, recovery planning, and management practices for on-premises and Azure SQL environments. The course follows the kind of thinking a database administrator uses on the job: protect the data first, make access intentional, and never assume a backup is useful until you have proven you can restore it.

What This Course Is Really Teaching You

This course is centered on practical SQL Server 2016 administration skills, with a strong emphasis on security and recoverability. That is not an accident. In my experience, those are the two areas where weak administrators are exposed immediately. If permissions are sloppy, users see too much. If backups are poorly designed, a failure becomes a crisis. If encryption is misunderstood, compliance becomes guesswork. So the course teaches you how to configure SQL Server in ways that reduce risk instead of creating it.

You will learn how to manage encryption at multiple levels, including cell-level encryption, Transparent Data Encryption, Always Encrypted, backup encryption, and connection encryption. You will also work through identity and access control, including users, custom roles, object permissions, row-level security, and dynamic data masking. From there, the course expands into auditing and backup strategy, including very large databases and backup alerting. That combination reflects real administration work. It is not enough to secure one layer and ignore the rest. SQL Server security is a system, not a checkbox.

For students preparing for Microsoft SQL Server administration objectives, this kind of training is valuable because it aligns with the kinds of tasks employers expect you to perform independently. You need to understand not just what a feature does, but when to use it, what tradeoffs it introduces, and how to troubleshoot it when it behaves exactly as designed but not the way the business hoped. That last part is where good administrators separate themselves.

Security and Encryption: The Part That Actually Protects the Business

The first major section of the course focuses on encryption, and that is the right place to start. In SQL Server administration, encryption is not a decorative feature. It is how you protect sensitive information when you cannot assume every user, backup file, or network path is trustworthy. You will work through the mechanics of configuring encryption and then move into the practical implementations that matter in production.

Cell-level encryption is useful when specific columns must be protected from direct exposure. Transparent Data Encryption helps protect data at rest without changing the application’s behavior, which is why it is so often used for compliance-driven environments. Always Encrypted is different again: it is designed so that even the database engine cannot read certain sensitive values. That distinction matters. A lot of people lump “encryption” together as if it were one thing. It is not. Each option solves a different problem, and choosing the wrong one can leave you either underprotected or burdened with unnecessary complexity.

You will also cover backup encryption and connection encryption, both of which are easy to overlook until an audit or incident forces the issue. Backup encryption helps protect database files outside the server, where they are often at their most vulnerable. Connection encryption secures traffic between client and server, which is essential when applications move sensitive data across networks you do not control. If you do this work well, you are not simply meeting a technical requirement; you are reducing the number of places your data can be exposed.

Encryption is only useful when you know what problem it solves. The mistake I see most often is using the wrong encryption feature because it sounds secure. This course teaches you to choose deliberately.

Permissions, Roles, and Data Access: Control Is the Point

SQL Server permissions are one of those topics that look simple until a real application is involved. Then you discover how quickly ad hoc access creates confusion. The course walks you through creating and maintaining users, configuring custom roles, and managing object permissions so that you can build access models that make sense. That means you are not just granting permissions because someone asked for them; you are designing access based on the actual responsibilities of the user or application account.

You will also work with row-level security and dynamic data masking, two features that are particularly useful when different users must access the same database without seeing the same data. Row-level security restricts which rows a user can see. Dynamic data masking limits how sensitive values are displayed to users who should not see full detail. These features are especially useful in reporting, support, and shared-service environments where the business wants access without overexposure.

Then there is Azure SQL Database user configuration, which adds another layer of practical relevance. Administration is not just about one deployment model anymore. You may need to support hybrid environments or cloud-hosted databases where identity and access are handled differently than on a traditional server. Understanding these differences makes you more useful immediately. It also makes you harder to replace, which is not a bad thing from a career standpoint.

Auditing: If You Can’t Prove What Happened, You’re Guessing

Auditing is the difference between a system that is technically secure and a system that can withstand scrutiny. This course teaches you how to manage a SQL Server Audit, query the audit log, and work with Azure SQL Server Audit so you can track activity in a way that supports accountability. That matters in regulated environments, but it also matters any time there is a security incident, data dispute, or change-control question.

A lot of administrators think auditing is just about recording everything and hoping storage holds up. That is lazy administration. Proper auditing starts with deciding what events matter. Who changed permissions? Who accessed protected records? Who attempted to alter security configuration? Which actions should be visible to security staff, and which ones are just noise? A useful audit design is selective, intentional, and readable.

In practical terms, this section helps you build a defensible audit process. If management asks whether sensitive table access can be traced, you should know where to look. If an auditor asks how administrative actions are monitored, you should be able to explain the difference between event capture and event review. And if an alert or log entry looks suspicious, you should know how to investigate without destroying the evidence you were trying to preserve in the first place.

Backup Strategy: The Restore Is What Counts

Backups are the backbone of database administration, and this course treats them that way. You will study backup types, database management and restore workflows, backup strategies for very large databases, alerting for failed backups, and backups to Azure. The broad theme is simple: a backup that cannot be restored is not a backup. It is a file you are hoping will save you later.

Understanding backup types is essential because different recovery goals require different methods. Full backups, differential backups, and transaction log backups each play a role in creating a recovery chain. If you do not understand how those pieces fit together, you will either over-back up and waste resources or under-back up and leave gaps in recovery. The course is designed to help you think in terms of recovery point objectives and recovery time objectives, even if those terms are not always spelled out in daily conversation.

Very large databases deserve special attention because the same backup approach that works fine for a small system may be too slow or too disruptive at scale. That is where careful planning, file handling, and operational discipline matter. You will also see why alerting on failed backups is not optional. Too many teams find out a backup failed only when they try to use it. By then, the failure is no longer technical; it is organizational.

Who Should Take This Course

This course is a strong fit for database administrators, system administrators, support engineers, developers who are moving into database ownership, and IT professionals who need to manage SQL Server 2016 environments with more confidence. It is especially useful if you already understand basic SQL concepts but need to learn the operational side of database administration. If your current work involves access requests, backup verification, security configuration, or incident response, you are in the right place.

It is also a practical choice for students preparing for job roles such as SQL Server Administrator, Database Administrator, Database Support Analyst, Infrastructure Administrator, or Systems Engineer with database responsibilities. In smaller organizations, one person often wears multiple hats. In those environments, you may be expected to handle the server, the database, the permissions, the backup plan, and the audit trail. This course gives you the tools to do that without improvising your way through production.

If you are already working in the field, this training helps you tighten weak spots. Maybe you can restore a database but have never implemented row-level security. Maybe you know how to create users but not how to design a role model that survives growth. Maybe you have used encryption features without fully understanding the differences between them. That is exactly the kind of gap this course is meant to close.

Prerequisites and the Best Way to Approach the Material

You do not need to be a SQL Server wizard before starting, but you should be comfortable with basic database concepts and Windows administration fundamentals. If you know what a database, table, login, and backup are, you have enough background to get real value from this course. If you have already worked in SQL Server Management Studio, even better. The course assumes you are ready to learn how to administer the platform, not discover what a database is for the first time.

The best way to approach the material is to follow the logic of the administration tasks rather than treating each topic as isolated. Start by understanding why security features are used, then move into permissions and auditing, and finally build your backup and recovery mindset. That sequence reflects how real systems are protected. Security without recovery is fragile. Recovery without auditing is incomplete. Permissions without encryption can still expose data. The pieces are connected, and the course is designed to make those connections visible.

When you work through the labs, do not just copy steps. Ask yourself what the configuration is protecting, what could break it, and what evidence would tell you it is working correctly. That habit will help you much more than memorizing a menu path ever will.

Career Value and the Work This Training Helps You Do

The career value here is straightforward: organizations trust database administrators with systems that hold customer data, financial records, internal reporting, and operational applications. That makes this skill set immediately relevant. The U.S. Bureau of Labor Statistics groups database administration with related roles and reports that database administrators and architects earn a median annual wage well above the national average, with pay varying by experience, industry, and location. The reason is simple enough. If the database fails, the business notices. If the database is exposed, the business may have a much bigger problem than downtime.

This training helps you contribute in ways that employers notice quickly. You will be able to:

  • configure encryption for sensitive data and backups
  • manage users, permissions, and custom roles with intention
  • implement row-level security and dynamic data masking where appropriate
  • set up and review auditing for administrative and security events
  • build backup strategies that support actual recovery goals
  • handle large database backup scenarios with more discipline
  • support Azure SQL security and auditing tasks

Those are not theoretical wins. They translate directly into reduced risk, fewer access mistakes, faster incident response, and better operational credibility. When a manager asks who can own the database security and recovery story, you want to be the person who can answer without hesitation.

How This Course Reflects Real SQL Server Administration

I designed this course around the tasks administrators actually inherit, not the tidy version of the job that shows up in textbook examples. A restored sample database, a permission request that needs to be handled carefully, a backup that must survive a compliance review, a security feature that sounds similar to another but behaves differently in production — that is the real work. This course keeps you close to those realities.

You will see that in the lab-driven approach to encryption and permissions, where configuration matters, verification matters, and troubleshooting matters just as much. You will see it in the backup strategy content, where the focus is not merely on creating backups but on designing a recovery posture. You will see it in the auditing section, where logs are treated as evidence rather than clutter. And you will see it in the cloud-related material, because administration rarely stays on one platform anymore.

If you want a course that teaches you how to think like the person responsible for the database after everyone else has gone home, this is the one. It is practical, specific, and built to help you do the work that keeps SQL Server stable, secure, and recoverable.

Microsoft® is a registered trademark of Microsoft Corporation. This content is for educational purposes.

Who Benefits From This Course

  • Database administrators seeking to deepen their understanding of SQL Server 2016
  • IT professionals who work with data integrity and want to improve their skills
  • Cloud database managers looking to improve their knowledge of Azure SQL database user options
  • Database developers interested in learning more about encryption, data access, and permissions
  • IT specialists who want to develop a comprehensive backup strategy for large databases
  • System administrators interested in improving their skills in monitoring SQL Server Instances
  • IT managers looking to implement effective failover cluster strategies
  • Professionals responsible for implementing and managing Always On Availability Groups
  • Individuals preparing for the Microsoft 70-764 certification exam

Frequently Asked Questions

What topics are covered in the Microsoft 70-764 SQL Server 2016 Administration exam?

The Microsoft 70-764 exam focuses on a comprehensive set of skills required to effectively administer SQL Server 2016 environments. Key domains include configuring security and encryption, managing data access and permissions, implementing auditing, developing backup and restore strategies, and managing high-availability features such as Always On Availability Groups, Failover Clusters, and Log Shipping.

Additional topics involve monitoring SQL Server instances, managing indexes, troubleshooting performance issues, and implementing maintenance plans. The exam also covers Azure SQL Database management, including security and auditing in cloud environments. Preparation for this exam ensures proficiency in operational tasks like database backup management, recovery planning, and security configuration, which are essential for responsible SQL Server administration.

How does this course prepare me for the Microsoft 70-764 exam and real-world SQL Server administration?

This course is designed to simulate the real-world responsibilities of a SQL Server administrator, emphasizing practical skills over theoretical knowledge. It guides students through configuring encryption, managing permissions, setting up auditing, and designing backup strategies, all crucial tasks for maintaining secure and recoverable SQL Server environments.

The course incorporates lab exercises, scenario-based tasks, and troubleshooting techniques that mirror actual administrative challenges. By focusing on operational best practices and system security, it prepares you not only to pass the Microsoft 70-764 exam but also to handle day-to-day tasks confidently, such as restoring databases, managing high-availability configurations, and implementing security policies in both on-premises and Azure environments.

What are the career benefits of earning the Microsoft 70-764 certification?

Achieving the Microsoft 70-764 certification validates your expertise in SQL Server 2016 administration, making you a valuable asset to organizations that rely on SQL Server for their data management needs. Certified professionals are often considered for higher-level roles such as SQL Server Database Administrator, Data Security Specialist, or Infrastructure Engineer.

This certification can lead to increased earning potential, career advancement, and greater job security. It demonstrates your ability to implement security, manage backups, and troubleshoot complex database issues, which are critical skills in today's data-driven business environment. Additionally, it provides a competitive edge in the job market, especially as businesses expand their cloud and hybrid database environments.

What are the recommended prerequisites and best practices for preparing for the Microsoft 70-764 exam?

Prerequisites include a solid understanding of basic SQL Server concepts, Windows administration, and familiarity with SQL Server Management Studio. Hands-on experience with database backup and restore, security configuration, and basic troubleshooting is highly recommended. A foundational knowledge of cloud concepts, especially Azure SQL Database, is also beneficial.

The best approach to preparation involves a combination of studying the course materials, performing hands-on labs, and practicing real-world scenarios. Focus on understanding why each feature is used, how to configure it correctly, and troubleshooting common issues. Additionally, reviewing official exam objectives and taking practice exams can help identify knowledge gaps and improve confidence before the test day.

How does this course address security and compliance concerns in SQL Server 2016?

This course emphasizes the importance of security and compliance by teaching detailed strategies for configuring encryption at multiple levels, managing permissions and roles, and implementing auditing. It covers cell-level encryption, Transparent Data Encryption, Always Encrypted, backup encryption, and connection encryption to protect data both at rest and in transit.

Students learn to design access control models using users, roles, row-level security, and dynamic data masking to restrict data exposure based on responsibilities. The auditing modules teach how to log and review security-related events, ensuring accountability and regulatory compliance. By focusing on a layered security approach, the course helps organizations reduce data breach risks and meet compliance standards effectively.

Included In This Course

Module 1: Configure Encryption

  •    Introduction
  •    Exam Objectives and Lab Setup
  •    Restoring AdventureWorks 2016 Database Lab Part 1
  •    Restoring AdventureWorks 2016 Database Lab Part 2
  •    Restoring AdventureWorks 2016 Database Lab Part 3
  •    Configure Encryption
  •    Cell-Level Encryption Part 1
  •    Cell-Level Encryption Part 2
  •    Cell-Level Encryption Lab Part 1
  •    Cell-Level Encryption Lab Part 2
  •    Transparent Data Encryption
  •    Transparent Data Encryption Lab
  •    Always Encrypted
  •    Always Encrypted Lab
  •    Backup Encryption
  •    Backup Encryption Lab
  •    Connection Encryption
  •    Encryption Troubleshooting

Module 2: Configure Data Access and Permissions

  •    Create and Maintain Users
  •    Create and Maintain Users Lab Part 1
  •    Create and Maintain Users Lab Part 2
  •    Configure and Maintain Custom Roles
  •    Configure and Maintain Custom Roles Lab
  •    Manage Database Object Permissions Part 1
  •    Manage Database Object Permissions Part 2
  •    Manage Database Object Permissions Lab Part 1
  •    Manage Database Object Permissions Lab Part 2
  •    Configure User Options for Azure SQL Database
  •    Configure Row-Level Security
  •    Configure Dynamic Data Masking
  •    Configure Dynamic Data Masking Lab

Module 3: Configure Auditing

  •    Manage a SQL Server Audit
  •    Manage a SQL Server Audit Lab
  •    Query the SQL Server Audit Log
  •    Manage an Azure SQL Server Audit

Module 4: Develop a Backup Strategy

  •    Backup Types Part 1
  •    Backup Types Part 2
  •    Manage, Backup, and Restore Databases Lab Part 1
  •    Manage, Backup, and Restore Databases Lab Part 2
  •    Backup Very Large Databases Part 1
  •    Backup Very Large Databases Part 2
  •    Backup Very Large Databases Part 3
  •    Backup Very Large Databases Part 4
  •    4.9 Managing Very Large Databases Lab Part 1
  •    4.10 Managing Very Large Databases Lab Part 2
  •    4.11 Managing Very Large Databases Lab Part 3
  •    Configure Alerting for Failed Backups
  •    Configure Alerting for Failed Backups Lab Part 1
  •    Configure Alerting for Failed Backups Lab Part 2
  •    Back up Databases to Azure
  •    Manage Transaction Log Backups
  •    Configure Database Recovery Models
  •    Set Database Recovery Model Lab
  •    Configure Backup Automation
  •    Configure Backup Automation Lab

Module 5: Restore Databases

  •    Perform Piecemeal Restores
  •    Restore Databases Lab Part 1
  •    Restore Databases Lab Part 2
  •    Restore Databases Lab Part 3
  •    Perform Page Recovery
  •    Perform Point-in-Time Recovery
  •    Perform Point-in-Time Recovery Lab
  •    Restore File Groups
  •    Develop a Plan to Automate and Test Restores

Module 6: Manage Database Integrity

  •    Implement Database Consistency Checks
  •    Implement Database Consistency Checks Lab
  •    Identify Database Corruption
  •    Recover From Database Corruption

Module 7: Monitor Database Activity

  •    Monitor Current Sessions
  •    Monitor Current Sessions Lab
  •    Identify Sessions that Cause Blocking Activity
  •    Identify Sessions that Consume tempdb Resources
  •    Configure the Data Collector

Module 8: Monitor Queries

  •    Manage the Query Store
  •    Manage the Query Store Lab
  •    Configure Extended Events and Trace Events
  •    Identify Problematic Execution Plans

Module 9: Manage Indexes

  •    Identify and Repair Index Fragmentation
  •    Identify and Create Missing Indexes
  •    Identify and Drop Underutilized Indexes
  •    Manage Existing Columnstore Indexes Part 1
  •    Manage Existing Columnstore Indexes Part 2
  •    Partitioned Tables

Module 10: Monitor SQL Server Instances

  •    Create and Manage Operators
  •    Create and Manage SQL Agent Alerts
  •    Configure Policy-Based Management
  •    Configure Policy-Based Management Lab
  •    Identify Available Space on Data Volumes
  •    Identify the Cause of- Manage Performance Degradation
  •    Identify the Cause of- Manage Performance Degradation Lab Part 1
  •    Identify the Cause of- Manage Performance Degradation Lab Part 2

Module 11: Implement Log Shipping

  •    Configure and Monitor Log Shipping
  •    Configure and Monitor Log Shipping Lab Part 1
  •    Configure and Monitor Log Shipping Lab Part 2

Module 12: Implement Failover Cluster Instances

  •    Windows Server Failover Cluster
  •    Manage Shared Disks
  •    Configure Cluster Shared Volumes
  •    Configuring WSFC Lab

Module 13: Implement Always On Availability Groups

  •    Database Mirroring
  •    Create an Availability Group
  •    Manage Failover
  •    Configure Read-Only Routing
  •    Create Distributed Availability Groups
  •    Configuring Always On Availability Group Lab Part 1
  •    Configuring Always On Availability Group Lab Part 2
  •    Conclusion