Database Administration: Database User Management and Permissions

In this lab, you’ll practice managing MySQL users and roles on a Linux machine. When you’re finished with this lab, you’ll have configured user permissions at various levels and verified access using MySQL commands.

  • Last updated 6/2024
  • English
  • Published 2024-08-06
  • Location Online
  • Duration 1h 5m
What you'll learn
  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Manage Users and Permissions

    To start things off, you’ll learn to manage MySQL users and roles on a Linux machine. You'll create users, set read-only and read/write roles, assign permissions, and verify access levels through MySQL commands. This hands-on lab is perfect for building foundational database administration skills.

  3. Challenge

    Manage Permissions on Databases, Tables, and Columns

    In this challenge, you’ll set up a database and create MySQL users with specific access: database-wide, table-specific, and column-specific. By creating roles and assigning permissions, you’ll control user access at multiple levels and verify permissions with SHOW GRANTS, enhancing your secure database management skills.

  4. Challenge

    Test Users, Roles, and Permissions

    You’ll test user permissions by logging in as each MySQL user and performing actions like reading, writing, and creating data. Verifying these permissions ensures each role works as expected and strengthens your database security skills.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

5.0 course rating
R
Raj P.
DevOps Engineer at CodeX Solutions

"A fantastic course! Lisa Taylor's approach to teaching DevOps best practices was outstanding. It’s given me a better understanding of automating workflows and improving team efficiency."

P
Peter W.
Cybersecurity Specialist at SecureTech

"The cybersecurity course exceeded my expectations. The practical labs and real-world case studies by Instructor Greg Scott were top-tier. A must for anyone serious about IT security!"

J
John Smith
Software Engineer

"The course content was exceptional! It covered all the latest trends in technology with real-world examples. I now feel more confident in my coding skills, and I highly recommend this to anyone looking to upskill."