Loading...

Oracle 12c Database Security

Course code: O1108

5 days £2,300.00
+ VAT

On iTrains Oracle 12c Database Security training course students will learn The Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and other pan-national schema's require extensive database security control to protect enterprise data.

Course content >

Who Should Attend?

DBA Administrators 

System Administrators 

Prerequisites

Oracle SQL and PL/SQL Familiarity

Course Reviews

iTrain also offer all of these courses as closed courses on your site. Please call 020 7608 1835

COURSE DATES
27 Nov 2017 Edinburgh Delegates:    £2,300.00
11 Dec 2017 London Delegates:    £2,300.00
08 Jan 2018 London Delegates:    £2,300.00
15 Jan 2018 Edinburgh Delegates:    £2,300.00
12 Feb 2018 London Delegates:    £2,300.00

Course Contents

This Oracle 12c Database Security course introduces students to the range of Oracle 12C database control features and products designed to fully support and enable enterprise wide database security.

Students will learn how to manage access control, create Virtual Private Databases, configure Audit Vaults and manage Oracle Database Firewall v 12.1.1 and the features to fully control and deploy enterprise wide security policies that will fulfill the regulatory requirements.

 

DAY 1

Introduction

  • Course Objectives
  • Course Schedule and Appendices

Understanding Security Requirements

  • Fundamental Data Security Requirements
  • Security Risks
  • Exploits
  • Techniques to Enforce Security

Choosing Security Solutions

  • Network Access Control
  • Database Access Control
  • Data Access Control
  • Data Confidentiality
  • Data Integrity
  • Audit
  • Compliance

Implementing Basic Database Security

  • Database Security Checklist
  • Reducing Administrative Effort
  • Principle of Least Privilege
  • Objects Protection

Securing Data on the Network

  • Network Access Control
  • Listener Security
  • Listener Usage Control

Using Basic and Strong User Authentication

  • Basic Authentication
  • Strong Authentication
  • Database Link Passwords Protection

Configuring Global User Authentication

  • About Enterprise User Management (EUS)
  • EUS and Oracle Internet Directory Integration

Using Proxy Authentication

  • Security Challenges of Three-Tier Computing
  • Proxy Authentication Solutions


DAY 2

Using Privileges and Roles

  • Separation of Duties
  • Roles Management
  • Managing Security for Definer's Rights and Invoker's Rights
  • Managing RMAN Virtual Private Catalogs

Using Privilege Analysis

  • Privilege Analysis Flow
  • Privilege Analysis Implementation

Using Application Contexts

  • Description of Application Context
  • Application Context Implementation

Implementing Virtual Private Database

  • Fine-Grained Access Control and VPD
  • FGAC Policies Management
  • VPD Policies Management

Implementing Oracle Label Security

  • Access Control Overview
  • Oracle Label Security Registration
  • Oracle Label Security Policies Management

Redacting Data

  • Redacting Data
  • Masking Policies Implementation


DAY 3

Using Oracle Data Masking

  • Overview
  • Data Masking Definition Implementation
  • Data Masking Process

Using Transparent Sensitive Data Protection

  • TDPS Implementation

Encryption Concepts and Solutions

  • Concepts
  • Solutions
  • Oracle Solutions

Encrypting with DBMS_CRYPTO Package

  • Usage

Using Transparent Data Encryption

  • Overview
  • The Master Keys and the Keystore
  • Hardware Keystore
  • Encryption


DAY 4

Introduction to Oracle Audit Vault

  • Responding to Compliance Regulations
  • Problems with In-House Auditing Implementations
  • Oracle Audit Vault Features
  • Oracle Audit Vault Architecture and Components
  • Overview of Oracle Audit Vault Users
  • Overview of Oracle Database Vault
  • Overview of the Audit Vault Data WarehouseOverview of Oracle Audit Vault Interface


Configuring Oracle Audit Vault

  • Registering Sources and Deploying Collectors
  • Overview of Oracle Database Collectors
  • Configuring the Oracle Source Database for CollectorsBasic Steps to Register an Oracle Source Database and Deploy Collectors
  • Creating the Source User in the Source Database

Managing Audit Settings
  • Using Audit Vault to Collect Audit Data
  • Introduction to Oracle Database Auditing


DAY 5

Introduction to Oracle Database Firewall

  • Understanding How Data is Compromised
  • Understanding Oracle’s Defense in Depth Security Approach
  • Oracle Database Security Solutions
  • Oracle Database Firewall (Overview)
  • Positive Security Model-Based Enforcement
  • Negative Security Model-Based Enforcement
  • Oracle Database Firewall Architecture
  • Protected Databases


Configuring Oracle Database Firewall

  • Configuring a Standalone Oracle Database Firewall System
  • Configuring an Oracle Database Firewall Management Server System
  • Creating an Enforcement Point
  • Oracle Database Firewall Operational Modes (Database Activity Monitoring, Database Policy Enforcement)
  • Oracle Database Firewall Logging
  • Oracle Database Firewall Logs
  • Determining the Protection Level for your Databases
  • Configuring System Administrator Users

Configuring Policies
  • Oracle Database Firewall Policy Enforcement
  • Policy Engine Flow
  • Configuring Policies
  • Oracle Database Firewall Preconfigured Policies
  • Creating Policy Files
  • Custom Policy Development Overview
  • Enabling the Firewall Analyzer to Understand Database Usage
  • Creating a Policy
Contact us for more information