Summer-Ready Savings: Find the Training Course You Need at a Price You'll Love

closeClose

Introduction to Oracle Database Security (Training On Demand)

Course Details
Code: D95129GC10
Tuition (USD): $815.00 $774.25 • Self Paced (1 day)
Generate a quote
Course Details
GSA (USD): $697.98 • Self Paced (1 day)
This course is available in other formats
Instructor-Led Classroom & Virtual
Introduction to Oracle Database Security (INTR-DB-SEC-1)

This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Develop a deep understanding of the security risks and Oracle solutions provided to help address those risks.

Learn To:

  • Describe and determine database security requirements.
  • Choose Oracle security solutions to meet security requirements.
  • Implement basic database security.
  • Configure network security.
  • Discover basic security configuration issues.

Benefits to You

By participating in hands-on practices and available demonstrations, you'll know how to use features of Oracle Database 12c to secure the databases in your own organization. You'll begin by implementing basic database and network security and build on this knowledge throughout the course.

Skills Gained

  • Describe and determine database security requirements
  • Understand Oracle security solutions to help meet security requirements
  • Implement basic database security
  • Configure network security
  • Discover basic security configuration issues

Who Can Benefit

  • Administrator
  • Database Administrator
  • End User
  • Network Administrator
  • Systems Administrator

Course Details

Topics

  • Introduction
    • Course Objectives
    • Course Schedule
    • Detective Security Controls
    • Preventive Security Controls
    • Your Learning Aids
    • Basic Workshop Architecture
  • Understanding Security Requirements
    • Fundamental Data Security Requirements
    • Security Risks
    • Techniques to Enforce Security
  • Choosing Security Solutions
    • Database Access Control: Authentication
    • Protecting Against Database Bypass with Encryption
    • Protecting Sensitive Data
    • Protecting against Application Bypass
    • Detecting Threats
    • Compliance
  • Implementing Basic Database Security
    • Database Security Checklist
    • Reducing Administrative Effort
    • Principle of Least Privilege
    • Objects Protection
  • Configuring Network Security
    • Network Access Control
    • Listener Security
    • Listener Usage Control
    • Manage fine-grained access to external network services
  • Discovering Basic Configuration Issues
    • Accessing Enterprise Manager Security Reports
    • Using Various Security Reports
  • Course Objectives
  • Course Schedule
  • Detective Security Controls
  • Preventive Security Controls
  • Your Learning Aids
  • Basic Workshop Architecture

Understanding Security Requirements

  • Fundamental Data Security Requirements
  • Security Risks
  • Techniques to Enforce Security

Choosing Security Solutions

  • Database Access Control: Authentication
  • Protecting Against Database Bypass with Encryption
  • Protecting Sensitive Data
  • Protecting against Application Bypass
  • Detecting Threats
  • Compliance

Implementing Basic Database Security

  • Database Security Checklist
  • Reducing Administrative Effort
  • Principle of Least Privilege
  • Objects Protection

Configuring Network Security

  • Network Access Control
  • Listener Security
  • Listener Usage Control
  • Manage fine-grained access to external network services

Discovering Basic Configuration Issues

  • Accessing Enterprise Manager Security Reports
  • Using Various Security Reports
Contact Us 1-800-803-3948
Contact Us Live Chat
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward