Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Oracle Database 11g: Introduction to Database Security and Solutions $74.95
Oracle Database 11g: Database Security $74.95
Oracle Database 11g: Database Auditing $74.95
Oracle Database 11g: Basic User and Strong Authentication $74.95
Oracle Database 11g: Enterprise User Security and Proxy Authentication $74.95
Oracle Database 11g: Privileges, Roles, and Application Contexts $74.95
Oracle Database 11g: Virtual Private Database $74.95
Oracle Database 11g: Oracle Label Security and the Data Masking Pack $74.95
Oracle Database 11g: Encryption Concepts $74.95
Oracle Database 11g: Transparent Data Encryption $74.95
Oracle Database 11g: Oracle Net Services and Listener Security $74.95
Oracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security $74.95

Bundle Price: $409.00
Total Savings: $490.40


Oracle Database 11g: Introduction to Database Security and Solutions

Every business should identify security threats and concerns and develop policies to protect itself. Maintaining the integrity of important data, and protecting data by controlling access to it are also key steps in business security. This course describes business security requirements and defines least privilege, authorization, and authentication. It also covers security policies, the concept of in-depth security, and applies these concepts to prevent SQL injection. Maintaining data integrity, protecting data, and controlling data access are also covered.
  • identify security requirements and compliance mandates
  • recognize security risks
  • recognize how to define and implement a security policy
  • recognize how to enforce a security policy
  • recognize ways to apply security practices
  • recognize how to protect data
  • recognize how to control access
  • configure the management agent and monitoring credentials

Oracle Database 11g: Database Security

Oracle Database server is highly secure, but to fully maximize the security features offered, the database must be well protected as well. This course explores how to configure Oracle Database 11g in a secure manner by adhering to industry standard best security practices for operational database deployments. It covers applying the principle of least privilege to the database, locking and expiring default user accounts, changing default user passwords, creating strong passwords, enforcing password management, and protecting the data dictionary.
  • configure database security in Oracle Database 11g
  • recognize how to manage accounts in Oracle Database 11g
  • manage passwords in Oracle Database 11g
  • recognize ways to protect the data dictionary
  • use the Configuration Management Pack
  • manage passwords
  • manage violations in Oracle 11g

Oracle Database 11g: Database Auditing

Monitoring or auditing should be an integral part of your security procedures. Oracle Database 11g includes auditing tools for database, user, and fine-grained auditing. This course explores how to implement basic database auditing, privileged user auditing, DML and DDL auditing, and how to send audit records to the operating system files. Implementing fine-grained auditing (FGA), maintaining FGA policies, implementing an FGA audit event handler, and reading FGA audit events from the FGA audit trail are also covered.
  • recognize how to implement basic database auditing
  • recognize how to implement auditing of users and objects
  • recognize how FGA is implemented
  • alter the DEFAULT profile
  • perform auditing of privileged users
  • implement fine-grained auditing

Oracle Database 11g: Basic User and Strong Authentication

A basic security requirement is that you must know your users. You must identify them before you can determine their privileges and access rights, so that you can audit their actions on the data. This course covers creating and auditing database authenticated users and operating-system-authenticated users. It explores authenticating users with passwords or the operating system, and protecting passwords and database link passwords. In addition, this course describes strong authentication that uses certificates, Kerberos, and remote authentication dial-in service (RADIUS), as well as a setup for strong authentication that uses certificates, Kerberos, and key distribution center (KDC). How to implement the secure external password store is also covered.
  • recognize how to perform basic user authentication
  • recognize the features of strong authentication
  • configure strong authentication
  • implement OS authentication of a local user
  • use passwords in authentication
  • view the contents of the wallet

Oracle Database 11g: Enterprise User Security and Proxy Authentication

Enterprise User Security addresses the user, the administrative, and the security challenges by centralizing storage and management of user-related information in a Lightweight Directory Access Protocol-compliant directory service. This course describes the basic components of Enterprise User Security. It shows the architecture of this feature and describes the installation process. The components required to create and manage an enterprise user are discussed. In addition, the course explains the techniques for using the enterprise user in the context of the database server and integrating the enterprise user with familiar security policies and auditing. How proxy authentication works, how to manage users authenticated by proxy authentication, and how to audit users authenticated by proxy are also covered.
  • recognize how to set up Enterprise User Security
  • recognize how to work with Enterprise User Security
  • recognize how authentication works in three tiered systems
  • recognize proxy authentication solutions
  • manage users authenticated by proxy authentication
  • recognize how to audit users with proxy authentication
  • set up Enterprise User Security
  • use schemas for authentication
  • implement proxy authentication

Oracle Database 11g: Privileges, Roles, and Application Contexts

Authorization is the process that determines the privileges that the user is allowed to exercise. In the Oracle database, authorization is determined by the grant of system and object privileges. This course covers implementing roles, enterprise roles, and the securing of objects through procedures. It also describes how secure application roles work and how to manage roles and users by using secure application roles. An application context is a memory container with read-only attributes, which can be used in your application. How an application context is used, the sources of application context values, implementing a local context, and implementing an application context that is accessed globally are also covered.
  • recognize how roles and privileges can be used
  • recognize how to use secure application roles
  • recognize how an application context is used
  • recognize how to implement an application context accessed globally
  • use roles in Oracle Database 11g
  • use application context in Oracle Database 11g

Oracle Database 11g: Virtual Private Database

A Virtual Private Database (VPD) uses fine-grained access control (FGAC) to limit row and column access and an application context to provide the information that is used to set the policy predicates. This course describes VPD, how to implement VPD, and group policies. It also explores how FGAC is used with VPD, as well as tools, policies, and policy types.
  • recognize how a Virtual Private Database works
  • recognize how a policy group is implemented
  • recognize how to work with policies
  • recognize the best practices for VPD
  • use policies in Oracle Database 11g

Oracle Database 11g: Oracle Label Security and the Data Masking Pack

Oracle Label Security is a powerful tool for classifying data and mediating access to data based on its classification. It provides an easy-to-implement row-level security solution and is built on the fine-grained access control technology of the virtual private database (VPD). This course describes Oracle Label Security, including label concepts and access mediation, as well as when to use Oracle Label Security. It also explores creating policies, defining data labels, applying policies to tables, and setting up user authorizations. Data masking is the process of replacing sensitive information with realistic data based on masking rules. Data masking is used so that data can be shared with nonproduction users such as testing companies. This course also covers creating masking formats, managing format library, masking sensitive and confidential data, and creating custom reports.
  • recognize how Oracle Label Security works
  • recognize how to create a policy
  • recognize how data labels are created
  • create labels and policies in Oracle Database 11g
  • apply policies in Oracle Database 11g
  • test access control
  • recognize how data masking works
  • create and use data masking
  • use the Data Masking Pack

Oracle Database 11g: Encryption Concepts

All encryption has two parts: an algorithm, which is a procedure or a method of manipulating data, and a key or a secret that allows data to be decrypted. This course discusses the issues and challenges of encryption and describes key management solutions. It also describes the encryption options available with Oracle Database 11g. Using DBMS_CRYPTO to generate random encryption keys and encrypting and decrypting table columns are also covered.
  • identify the issues and challenges of encryption
  • recognize how to manage keys in Oracle Database 11g
  • recognize how to generate an encryption key
  • encrypt and decrypt in Oracle Database 11g
  • use encryption in Oracle Database 11g

Oracle Database 11g: Transparent Data Encryption

Transparent Data Encryption (TDE) is available with Oracle Advanced Security (ASO) and provides easy-to-use protection for your data without requiring changes to your applications. This course demonstrates how to set up the database master encryption key and implement TDE. It also explores how to encrypt column and tablespace data. Using Recovery Manager (RMAN)-encrypted backups, Oracle Secure Backup (OSB), and Data Pump Export encryption are also covered.
  • recognize how Transparent Data Encryption is set up
  • configure encrypted columns
  • implement Transparent Data Encryption
  • identify ways to apply file encryption
  • create and recover backups

Oracle Database 11g: Oracle Net Services and Listener Security

When considering Oracle security, you must also consider the security of the listener, which is the gateway to the network and the network itself. This course describes the items on the client, listener, and network security checklists. It demonstrates how to secure administration of the network, restrict access by IP address, and encrypt network traffic. Restricting the privileges of the listener, administering the listener securely, and monitoring listener activity are also covered.
  • recognize the uses of checklists
  • restrict network IP addresses
  • encrypt network traffic
  • configure Net Security
  • restrict listener privileges
  • administer and monitor a listener
  • configure listener security

Oracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security

There is no single best architecture for accommodating Internet requests requiring access to corporate intranets. Instead, trade-offs must be made between two competing goals – security of the intranet against an Internet attack and ease of access to services by both Internet and intranet clients. This course describes how firewalls are used to restrict network access and the guidelines for positioning servers within firewalls. It also explores how to configure Oracle Connection Manager to accept or reject connection requests and log connection events, and how to read connection events from the Oracle Connection Manager log. How the PRODUCT_USER_PROFILE (PUP) table is used in SQL*Plus and how to use this table to disable commands or roles in SQL*Plus is also covered.
  • recognize how firewalls are used
  • configure Oracle Connection Manager
  • set up a firewall using CMAN
  • recognize how the PUP table is used in SQL *Plus
  • configure security using SQL *Plus
Register Now
Oracle Database 11g: Security e-learning bundle
  • Course ID:
    271471
  • Duration:
    n/a
  • Price:
    $409