Terms you'll need to understand:
Login User Role Encryption Auditing C2 security Permissions Techniques you'll need to master:
Granting permissions Creating logins Assigning database access to users Creating database objects Creating roles and assigning users to roles Using application roles