Terms you'll need to understand:
Login
User
Role
Encryption
Auditing
C2 security
Permissions
Techniques you'll need to master:
Granting permissions
Creating logins
Assigning database access to users
Creating database objects
Creating roles and assigning users to roles
Using application roles