Course Overview
In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act and others requires better security at the database level.
Learn To:
- Implement Oracle Database security features to ensure the data is secure
- Implement Oracle Database security features to ensure compliance with regulations
Security Features
This course discusses the following security features of the database: auditing, encryption for Payment Card Industry Data Security Standard (PCI DSS ) including encryption at the column, tablespace and file levels, Virtual Private Database, Oracle Label Security and Enterprise User Security.
Some of the Oracle Network security topics included are: securing the listener and restricting connections by IP address.
Who should attend
- Database Administrators
- System Analysts
- Support Engineer
- Technical Administrator
- Security Administrators
- Administrator
Prerequisites
Required Prerequisites:
- Oracle Database 11g: Administration Workshop I
- Oracle Database 11g: Administration Workshop I DBA (D50102)
Suggested Prerequisites:
- Oracle Database 11g: Administration Workshop II
- Oracle Database 11g: Administration Workshop II (D50079)
Course Objectives
- Manage Virtual Private Database
- Implement fine-grained auditing
- Use Transparent Data Encryption
- Use file encryption
- Encrypt and decrypt table columns
- Set up Oracle Label Security policies
- Use basic Oracle Database security features
- Choose a user authentication model
- Secure the database and the listeners
- Use the Enterprise Security Manager tool
- Manage users using proxy authentication
- Implement Enterprise User Security
- Describe the benefits and requirements associated with the Oracle Advanced Security option
- Manage secure application roles
- Implement fine-grained access control
Course Content
- Introduction to Database Security
- Choosing Security Solutions
- Basic Database Security
- Auditing Database Users, Privileges, and Objects
- Auditing DML Statements
- Using Basic User Authentication
- Using Strong Authentication
- Using Enterprise User Security
- Using Proxy Authentication
- Using Privileges and Roles
- Access Control
- Implementing Virtual Private Database
- Oracle Label Security Concepts
- Implementing Oracle Label Security
- Using the Data Masking Pack
- Encryption Concepts
- Using Application-Based Encryption
- Applying Transparent Data Encryption
- Applying File Encryption
- Oracle Net Services: Security Checklists
- Securing the Listener