Oracle Database 11g: Security Release 2 Training Logo

Oracle Database 11g: Security Release 2 Training

Live Online & Classroom Enterprise Certification Training

Powered By

Oracle Logo

This Database 11g Security training teaches you to use Oracle Database features to meet the privacy, compliance and security requirements of your organization. Learn how to secure the database and use its features that enhance security

ATP_Authorized Logo

Powered By

Oracle Logo

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Certified Trainer

  • Authorized Courseware

  • Completion Certificate from ATP

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is 11g: Security Release 2 Certification Training about?

In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act and others requires better security at the database level.

This course discusses the following security features of the database: auditing, encryption for Payment Card Industry Data Security Standard (PCI DSS ) including encryption at the column, tablespace and file levels, Virtual Private Database, Oracle Label Security and Enterprise User Security.

Some of the Oracle Network security topics included are: securing the listener and restricting connections by IP address.


What are the objectives of 11g: Security Release 2 Certification Training ?

  • Manage Virtual Private Database
  • Implement fine-grained auditing
  • Use Transparent Data Encryption
  • Use file encryption
  • Encrypt and decrypt table columns
  • Set up Oracle Label Security policies
  • Use basic Oracle Database security features
  • Choose a user authentication model
  • Secure the database and the listeners
  • Use the Enterprise Security Manager tool
  • Manage users using proxy authentication
  • Implement Enterprise User Security
  • Describe the benefits and requirements associated with the Oracle Advanced Security option
  • Manage secure application roles
  • Implement fine-grained access control

Who is 11g: Security Release 2 Certification Training for?

  • Database Administrators
  • System Analysts
  • Support Engineer
  • Technical Administrator
  • Security Administrators
  • Administrator

What are the prerequisites for 11g: Security Release 2 Certification Training?

Suggested Prerequisite

  • Oracle Database 11g: Administration Workshop I
  • Oracle Database 11g: Administration Workshop II

Required Prerequisite

  • Oracle Database 11g: Administration Workshop I Release 2
  • Oracle Database 11g: Administration Workshop II Release 2

Available Training Modes

Live Online Training

40 Hours

Classroom Training

5 Days

Course Outline Expand All

Expand All

  • Implementing a Security Policy
  • Security Risks
  • Developing Your Security Policy
  • Defining a Security Policy
  • Compliance Mandates
  • Techniques to Enforce Security
  • Fundamental Data Security Requirements
  • Data Security Concerns
  • Oracle Audit Vault Overview
  • Compliance Scanner
  • Protecting Data
  • Oracle Database Vault Overview
  • Enterprise Manager Database Control: Policy Trend
  • Combining Optional Security Features
  • Maintaining Data Integrity
  • Controlling Data Access
  • Applying Security Patches
  • Enforcing Password Management
  • System and Object Privileges
  • Protecting the Data Dictionary
  • Reducing Administrative Effort
  • Database Security Checklist
  • Default Security Settings
  • Secure Password Support
  • Standard Database Auditing
  • Viewing Auditing Options
  • Monitoring for Suspicious Activity
  • Setting the AUDIT_TRAIL
  • Specifying Audit Options
  • Audit to XML Files
  • Value-Based Auditing
  • Auditing the SYSDBA Users
  • FGA Policy
  • Fine-Grained Auditing (FGA)
  • Enabling and Disabling an FGA Policy
  • Maintaining the Audit Trail
  • Using the DBMS_FGA Package
  • DBA_FGA_AUDIT_TRAIL
  • Data Dictionary Views
  • Triggering Audit Events
  • Using Database Links without Credentials
  • User Authentication
  • Protecting Passwords
  • Restricting a Database Link with Views
  • Encrypting Database Link Passwords
  • Auditing with Database Links
  • Using Database Links and Changing Passwords
  • Creating Fixed Database Links
  • Strong Authentication
  • Certificates
  • Configuring SSL on the Server
  • Single Sign-On
  • Public Key Infrastructure (PKI) Tools
  • Using Kerberos for Authentication
  • Using the orapki Utility
  • Configuring the Wallet
  • Oracle Database: Enterprise User security Architecture
  • Creating a Schema Mapping Object in the Directory
  • Oracle Identity Management Infrastructure: Default Deployment
  • Enterprise User Security
  • Installing Oracle Application Server Infrastructure
  • Managing Enterprise User Security
  • Oracle Internet Directory Structure Overview
  • Revoking Proxy Authentication
  • Security Challenges of Three-Tier Computing
  • Data Dictionary Views for Proxy Authentication
  • Using Proxy authentication for Database Users
  • Authenticating Database and Enterprise Users
  • Proxy Access Through SQL*Plus
  • Restricting the Privileges of the Middle Tier
  • Common Implementations of Authentication
  • Privileges
  • CONNECT Role Privileges
  • Benefits of Roles
  • Creating an Enterprise Role
  • Authorization
  • Using Proxy Authentication with Roles
  • Securing Objects with Procedures
  • Securing the Application Roles
  • Using the Application Context
  • PL/SQL Packages and Procedures
  • Using the SYS_CONTEXT PL/SQL Function
  • Application Context Data Sources
  • Implementing the Application Context Accessed Globally
  • Data Dictionary Views
  • Description of Application Context
  • Setting the Application Context
  • Using DBMS_RLS
  • VPD Best Practices
  • Exceptions to Fine-Grained Access Control Policies
  • How Fine-Grained Access Control Works
  • Virtual Private Database (VPD)
  • Implementing Policy Groups
  • Understanding Fine-Grained Access Control
  • Implementing a VPD Policy
  • Comparing Oracle Label Security and VPD
  • Oracle Label Security Features
  • Oracle Label Security
  • Installing Oracle Label Security
  • Access Control: Overview
  • Discretionary Access Control
  • How Sensitivity Labels are Used
  • Analyzing Application Needs
  • Identifying Data Labels
  • Adding Labels to Data
  • Assigning User Authorization Labels
  • Access Mediation
  • Defining Compartments
  • Implementing the Oracle Label Security Policy
  • Creating Policies
  • Defining Labels Overview
  • Viewing the Data Masking Impact Report
  • Identifying Sensitive Data for Masking
  • Types of Built-in Masking Primitives and Routines
  • Implementing a Post-Processing Function
  • Understanding Data Masking
  • Data Masking Pack Features
  • Data Masking of the EMPLOYEES Table
  • Creating an Application Masking Template by Exporting Data Masking Definitions
  • What to Encrypt
  • Data Encryption Challenges
  • Letting the User Manage the Key
  • Understanding Encryption
  • Problems that Encryption Solves
  • Storing the Key in the Database
  • Storing the Key in the Operating System
  • Encryption is not Access Control
  • Hash and Message Authentication Code
  • Generating Keys Using RANDOMBYTES
  • Using the DBMS_CRYPTO Package
  • DBMS_CRYPTO Package Overview
  • Enhanced Security Using the Cipher Block Modes
  • Using ENCRYPT and DECRYPT
  • Resetting (Rekeying) the Unified Master Encryption Key ** 11.2 **
  • Using Hardware Security Modules
  • Using Auto Login Wallet
  • Creating an Encrypted Tablespace
  • Creating the Master Key
  • Transparent Data Encryption (TDE)
  • TDE Column Encryption Support
  • Opening the Wallet
  • Restoring Encrypted Backups
  • RMAN Encrypted Backups
  • Encrypting Dump Files
  • Creating RMAN Encrypted Backups
  • Oracle Secure Backup Encryption
  • Using Password Mode Encryption
  • Using Dual Mode Encryption
  • Data Pump Encryption
  • Configuring Network Encryption
  • Configuring the Browser
  • Restricting Network IP Addresses: Guidelines
  • Securing the Client Computer
  • Configuring IP Restrictions with Oracle Net Manager
  • Overview of Security Checklists
  • Network Security Checklist
  • Using a Firewall to Restrict Network Access
  • Listener Security Checklist
  • Setting Listener Logging Parameters
  • Restricting the Privileges of the Listener
  • Using the INBOUND_CONNECT_TIMEOUT Parameter
  • Moving the Listener to a Nondefault Port
  • Analyzing Listener Log Files
  • Administering the Listener Using TCP/IP with SSL
  • Preventing Online Administration of the Listener

Who is the instructor for this training?

The Trainer is Oracle certified Instructor with extensive domain experience, including years of experience training & mentoring professionals in the industry.

Course Logo

11g: Security Release 2 Certification Training - Certification & Exam

  • SpringPeople is the Authorized Training Partner of Oracle.
  • The training fees is exclusive of exam cost.
  • For any queries; feel free to reach us at oracle@springpeople.com

Reviews