Introduction to Oracle Database Security Ed 1

0 étudiant

Duration: 1 Day

What you will learn

This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help
meet the security, privacy and compliance requirements of your organization. Develop a deep understanding of the
security risks and Oracle solutions provided to help address those risks.

Learn To:

Describe and determine database security requirements.
Choose Oracle security solutions to meet security requirements.
Implement basic database security.
Configure network security.
Discover basic security configuration issues.

Benefits to You

By participating in hands-on practices and available demonstrations, you’ll know how to use features of Oracle Database
12c to secure the databases in your own organization. You’ll begin by implementing basic database and network
security and build on this knowledge throughout the course.

Audience

Auditor
Database Administrators
Network Administrator
Security Administrators
Support Engineer
System Analysts

Related Training

Required Prerequisites
Good knowledge of Oracle Database
Suggested Prerequisites
Create and manage users, roles, and privileges

Course Objectives

Describe and determine database security requirements
Understand Oracle security solutions to help meet security requirements
Implement basic database security
Configure network security
Discover basic security configuration issues

Course Topics

Introduction

Course Objectives
Course Schedule
Detective Security Controls
Preventive Security Controls
Your Learning Aids
Basic Workshop Architecture

Understanding Security Requirements

Fundamental Data Security Requirements
Security Risks
Techniques to Enforce Security

Choosing Security Solutions

Database Access Control: Authentication
Protecting Against Database Bypass with Encryption
Protecting Sensitive Data
Protecting against Application Bypass
Detecting Threats
Compliance

Implementing Basic Database Security

Database Security Checklist
Reducing Administrative Effort
Principle of Least Privilege
Objects Protection

Configuring Network Security

Network Access Control
Listener Security
Listener Usage Control
Manage fine-grained access to external network services

Discovering Basic Configuration Issues

Accessing Enterprise Manager Security Reports
Using Various Security Reports

Les détails ne sont pas renseignés

Formateur

Avatar de l’utilisateur bscf

0.00 average based on 0 ratings

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%
Gratuit

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *