Oracle Database 12c: Security | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

Oracle Database 12c: Security

  • On Demand Class Icon
    On Demand
    • HRDF SBL Claimable
    • Certificate of Attendance available
    • 90 days of access from date of activation
    Starting From
    RM 6350.00
    40 Hours
  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    5 Days

Course Details

Expand All

This course is specially design for Security Administrators, Database Administrators, Network Administrator, Support Engineer, System Analysts and Security Compliance Auditors

Required Prerequisites:

  • Good knowledge of Oracle Database
  • Oracle Database 12c: Administration Workshop

Suggested Prerequisites:

  • Perform RMAN backup and recovery
  • Use Oracle Data Pump export and import
  • Create and manage users, roles, and privileges
  • Administer listeners

This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises

Upon completion of this program, participants should be able to:

  • Analyze any security risks of their organization
  • Find appropriate Oracle solutions to meet the security, privacy and compliance requirements of their organization
  • Find solutions to secure database access through the network
  • Configure appropriate authentication for the database or enterprise users in the organization
  • Control data access and integrity in their organization using the appropriate feature or option or product like privileges or Oracle Label Security
  • Ensure data confidentiality using an encryption solution like Transparent Data Encryption, or Data Redaction or Oracle Data Masking
  • Audit user actions using any of the auditing features like unified auditing

In the Oracle Database 12c: Security course learn how you can use Oracle Database features to meet the security, privacy and compliance requirements of your organization.

Learn To:

  • Understand Oracle security solutions and how they can help address your security requirements.
  • Configure strong authentication for database users using PKI and Kerberos.
  • Control data access using virtual private database and Oracle Label Security.
  • Analyze application privileges and reduce the attack surface using Oracle Database Vault Privilege Analysis.
  • Reduce risk of data exposure using Oracle Advanced Security Data Redaction, Transparent Data Encryption, and Oracle Data Masking.
  • Audit activity inside the database using policy and condition based unified auditing.
  • Configure network encryption to protect information in transit.
  • Audit activity inside the database using policy and condition based unified auditing.
  • Protect against application bypass using Oracle Database Vault Realms.

Benefits To You

The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and others requires better security at the database level. Students learn how to secure access to their databases and how to use the database features that enhance data access and confidentiality. This course provides suggested Oracle solutions for common problems.

Security Features

This course discusses the following security features of the database: authentication, data access control including user authorizations using privileges and roles, Privilege Analysis, Virtual Private Database, Oracle Label Security, as well as data confidentiality including Data Redaction, Oracle Data Masking, Transparent Sensitive Data Protection and encryption at the column, tablespace and file levels using Transparent Data Encryption. This course also discusses auditing using different features like unified auditing or fine-grained audit. The course includes some of the Oracle Network security topics such as securing the listener and restricting connections by IP address.

Hands-On Experience

Hands-on practices and available demonstrations help students learn how to use most of the features of Oracle Database 12c to secure their data center, using Oracle Enterprise Manager Cloud Control or other simple tools like SQL*Plus.


Expand All
  • Course Objectives
  • Course Schedule and Appendices
  • Fundamental Data Security Requirements
  • Security Risks
  • Exploits
  • Techniques to Enforce Security
  • Network Access Control
  • Database Access Control
  • Data Access Control
  • Data Confidentiality
  • Data Integrity
  • Audit
  • Compliance
  • Database Security Checklist
  • Reducing Administrative Effort
  • Principle of Least Privilege
  • Objects Protection
  • Network Access Control
  • Listener Security
  • Listener Usage Control
  • Basic Authentication
  • Strong Authentication
  • Database Link Passwords Protection
  • About Enterprise User Management (EUS)
  • EUS and Oracle Internet Directory Integration
  • Security Challenges of Three-Tier Computing
  • Proxy Authentication Solutions
  • Separation of Duties
  • Roles Management
  • Managing Security for Definer's Rights and Invoker's Rights
  • Managing RMAN Virtual Private Catalogs
  • Privilege Analysis Flow
  • Privilege Analysis Implementation
  • Description of Application Context
  • Application Context Implementation
  • Fine-Grained Access Control and VPD
  • FGAC Policies Management
  • VPD Policies Management
  • Access Control Overview
  • Oracle Label Security Registration
  • Oracle Label Security Policies Management
  • Redacting Data
  • Masking Policies Implementation
  • Overview
  • Data Masking Definition Implementation
  • Data Masking Process
  • Concepts
  • Solutions
  • Oracle Solutions
  • Overview
  • The Master Keys and the Keystore
  • Hardware Keystore
  • Encryption
  • RMAN and OSB Backups
  • RMAN Encryption Modes
  • Data Pump Export and Import of Encrypted Data
  • Auditing Overview
  • Unified Audit Management
  • Specific Audit Situations
  • Comparison with Unified Auditing
  • Overview
  • FGA Implementation



based on 0 ratings reviews