About this course

Course code TPD90815GC10
Duration 1 Day

In the Introduction to Oracle Database Security course, students learn how they can use Oracle Database features to help meet the security, privacy and compliance requirements of their organization.Learn To:Describe and determine database security requirements.Choose Oracle security solutions to meet security requirements.Implement basic database security.Configure network security.Discover basic security configuration issues. Benefits To You Students benefit from fundamental information about the security risks and Oracle solutions provided to help address those risks. Hands-on practices and available demonstrations help students learn how to determine how they can use features of Oracle Database 12c to secure the databases in their own organization, and they begin by implementing basic database and network security.Live Virtual Class FormatA Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording, copying, or transmission of LVC content may not be made.

Prerequisites

  • Good knowledge of Oracle DatabaseCreate and manage users, roles, and privileges

Delegates will learn how to

  • Describe and determine database security requirements
  • Understand Oracle security solutions to help meet security requirements
  • Implement basic database security
  • Configure network security
  • Discover basic security configuration issues

Outline

Introduction

  • Course Objectives
  • Course Schedule
  • Detective Security Controls
  • Preventive Security Controls
  • Your Learning Aids
  • Basic Workshop Architecture

Understanding Security Requirements

  • Fundamental Data Security Requirements
  • Security Risks
  • Techniques to Enforce Security

Choosing Security Solutions

  • Database Access Control: Authentication
  • Protecting Against Database Bypass with Encryption
  • Protecting Sensitive Data
  • Protecting against Application Bypass
  • Detecting Threats
  • Compliance

Implementing Basic Database Security

  • Database Security Checklist
  • Reducing Administrative Effort
  • Principle of Least Privilege
  • Objects Protection

Configuring Network Security

  • Network Access Control
  • Listener Security
  • Listener Usage Control
  • Manage fine-grained access to external network services

Discovering Basic Configuration Issues

  • Accessing Enterprise Manager Security Reports
  • Using Various Security Reports

1 Day

Duration

This is a QA approved partner course

Delivery Method

Delivery method

Virtual learning

Recreates a classroom experience online, enabling full interactions with the learning professional leading the course.

Find dates and prices

Sorry, we don't have any public dates scheduled for this course, but it can be run as a closed event for your company.
Please contact us for details on alternative ways we can help you 0113 220 7150 or email us at info@qa.com.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.