Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Course Description

Duration: 5.00 days (40 hours)

In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act and others requires better security at the database level.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Oracle Database 11g: Security Release 2 Course

  • » Technical Administrator
  • » Security Administrators
  • » Administrator
  • » Database Administrators
  • » System Analysts
  • » Support Engineer

Back to Top

Course Prerequisites for Oracle Database 11g: Security Release 2

Back to Top

Oracle Database 11g: Security Release 2 Course Objectives

  • » Manage Virtual Private Database
  • » Implement fine-grained auditing
  • » Use Transparent Data Encryption
  • » Use file encryption
  • » Encrypt and decrypt table columns
  • » Set up Oracle Label Security policies
  • » Use basic Oracle Database security features
  • » Choose a user authentication model
  • » Secure the database and the listeners
  • » Use the Enterprise Security Manager tool
  • » Manage users using proxy authentication
  • » Implement Enterprise User Security
  • » Describe the benefits and requirements associated with the Oracle Advanced Security option
  • » Manage secure application roles
  • » Implement fine-grained access control

Back to Top

Oracle Database 11g: Security Release 2 Course Outline

      1. Introduction to Database Security
        1. Fundamental Data Security Requirements
        2. Data Security Concerns
        3. Compliance Mandates
        4. Security Risks
        5. Developing Your Security Policy
        6. Defining a Security Policy
        7. Implementing a Security Policy
        8. Techniques to Enforce Security
      2. Choosing Security Solutions
        1. Maintaining Data Integrity
        2. Protecting Data
        3. Controlling Data Access
        4. Oracle Database Vault Overview
        5. Oracle Audit Vault Overview
        6. Combining Optional Security Features
        7. Compliance Scanner
        8. Enterprise Manager Database Control: Policy Trend
      3. Basic Database Security
        1. Database Security Checklist
        2. Reducing Administrative Effort
        3. Applying Security Patches
        4. Default Security Settings
        5. Secure Password Support
        6. Enforcing Password Management
        7. Protecting the Data Dictionary
        8. System and Object Privileges
      4. Auditing Database Users, Privileges, and Objects
        1. Monitoring for Suspicious Activity
        2. Standard Database Auditing
        3. Setting the AUDIT_TRAIL
        4. Specifying Audit Options
        5. Viewing Auditing Options
        6. Auditing the SYSDBA Users
        7. Audit to XML Files
        8. Value-Based Auditing
      5. Auditing DML Statements
        1. Fine-Grained Auditing (FGA)
        2. Using the DBMS_FGA Package
        3. FGA Policy
        4. Triggering Audit Events
        5. Data Dictionary Views
        6. DBA_FGA_AUDIT_TRAIL
        7. Enabling and Disabling an FGA Policy
        8. Maintaining the Audit Trail
      6. Using Basic User Authentication
        1. User Authentication
        2. Protecting Passwords
        3. Creating Fixed Database Links
        4. Encrypting Database Link Passwords
        5. Using Database Links without Credentials
        6. Using Database Links and Changing Passwords
        7. Auditing with Database Links
        8. Restricting a Database Link with Views
      7. Using Strong Authentication
        1. Strong Authentication
        2. Single Sign-On
        3. Public Key Infrastructure (PKI) Tools
        4. Configuring SSL on the Server
        5. Certificates
        6. Using the orapki Utility
        7. Using Kerberos for Authentication
        8. Configuring the Wallet
      8. Using Enterprise User Security
        1. Enterprise User Security
        2. Oracle Identity Management Infrastructure: Default Deployment
        3. Oracle Database: Enterprise User security Architecture
        4. Oracle Internet Directory Structure Overview
        5. Installing Oracle Application Server Infrastructure
        6. Managing Enterprise User Security
        7. Creating a Schema Mapping Object in the Directory
        8. Creating a Schema Mapping Object in the Directory
      9. Using Proxy Authentication
        1. Security Challenges of Three-Tier Computing
        2. Common Implementations of Authentication
        3. Restricting the Privileges of the Middle Tier
        4. Authenticating Database and Enterprise Users
        5. Using Proxy authentication for Database Users
        6. Proxy Access Through SQL*Plus
        7. Revoking Proxy Authentication
        8. Data Dictionary Views for Proxy Authentication
      10. Using Privileges and Roles
        1. Authorization
        2. Privileges
        3. Benefits of Roles
        4. CONNECT Role Privileges
        5. Using Proxy Authentication with Roles
        6. Creating an Enterprise Role
        7. Securing Objects with Procedures
        8. Securing the Application Roles
      11. Access Control
        1. Description of Application Context
        2. Using the Application Context
        3. Setting the Application Context
        4. Application Context Data Sources
        5. Using the SYS_CONTEXT PL/SQL Function
        6. PL/SQL Packages and Procedures
        7. Implementing the Application Context Accessed Globally
        8. Data Dictionary Views
      12. Implementing Virtual Private Database
        1. Understanding Fine-Grained Access Control
        2. Virtual Private Database (VPD)
        3. How Fine-Grained Access Control Works
        4. Using DBMS_RLS
        5. Exceptions to Fine-Grained Access Control Policies
        6. Implementing a VPD Policy
        7. Implementing Policy Groups
        8. VPD Best Practices
      13. Oracle Label Security Concepts
        1. Access Control: Overview
        2. Discretionary Access Control
        3. Oracle Label Security
        4. How Sensitivity Labels are Used
        5. Installing Oracle Label Security
        6. Oracle Label Security Features
        7. Comparing Oracle Label Security and VPD
        8. Analyzing Application Needs
      14. Implementing Oracle Label Security
        1. Implementing the Oracle Label Security Policy
        2. Creating Policies
        3. Defining Labels Overview
        4. Defining Compartments
        5. Identifying Data Labels
        6. Access Mediation
        7. Adding Labels to Data
        8. Assigning User Authorization Labels
      15. Using the Data Masking Pack
        1. Understanding Data Masking
        2. Data Masking Pack Features
        3. Identifying Sensitive Data for Masking
        4. Types of Built-in Masking Primitives and Routines
        5. Data Masking of the EMPLOYEES Table
        6. Implementing a Post-Processing Function
        7. Viewing the Data Masking Impact Report
        8. Creating an Application Masking Template by Exporting Data Masking Definitions
      16. Encryption Concepts
        1. Understanding Encryption
        2. Problems that Encryption Solves
        3. Encryption is not Access Control
        4. What to Encrypt
        5. Data Encryption Challenges
        6. Storing the Key in the Database
        7. Letting the User Manage the Key
        8. Storing the Key in the Operating System
      17. Using Application-Based Encryption
        1. DBMS_CRYPTO Package Overview
        2. Using the DBMS_CRYPTO Package
        3. Generating Keys Using RANDOMBYTES
        4. Using ENCRYPT and DECRYPT
        5. Enhanced Security Using the Cipher Block Modes
        6. Hash and Message Authentication Code
      18. Applying Transparent Data Encryption
        1. Transparent Data Encryption (TDE)
        2. Creating the Master Key
        3. Opening the Wallet
        4. Using Auto Login Wallet
        5. Resetting (Rekeying) the Unified Master Encryption Key ** 11.2 **
        6. Using Hardware Security Modules
        7. TDE Column Encryption Support
        8. Creating an Encrypted Tablespace
      19. Applying File Encryption
        1. RMAN Encrypted Backups
        2. Oracle Secure Backup Encryption
        3. Creating RMAN Encrypted Backups
        4. Using Password Mode Encryption
        5. Restoring Encrypted Backups
        6. Data Pump Encryption
        7. Using Dual Mode Encryption
        8. Encrypting Dump Files
      20. Oracle Net Services: Security Checklists
        1. Overview of Security Checklists
        2. Securing the Client Computer
        3. Configuring the Browser
        4. Network Security Checklist
        5. Using a Firewall to Restrict Network Access
        6. Restricting Network IP Addresses: Guidelines
        7. Configuring IP Restrictions with Oracle Net Manager
        8. Configuring Network Encryption
      21. Securing the Listener
        1. Listener Security Checklist
        2. Restricting the Privileges of the Listener
        3. Moving the Listener to a Nondefault Port
        4. Preventing Online Administration of the Listener
        5. Using the INBOUND_CONNECT_TIMEOUT Parameter
        6. Analyzing Listener Log Files
        7. Administering the Listener Using TCP/IP with SSL
        8. Setting Listener Logging Parameters

Back to Top

Do you have the right background for Oracle Database 11g: Security Release 2?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Arthur G.
- Masters Degree in Operations Research & Applied Mathematics from Columbia University along with several IT certifications.
- IT Professional for over 30 years and Software Trainer since 1997.
- Engineer and developer for top Wall Street financial firms such as JP Morgan Chase.

Bio:

Arthur has been an IT professional for over 30 years. After receiving his Bachelors in Computer Science from NYU, and Masters degree in Operations Research & Applied Mathematics from Columbia University, Arthur was recruited into the private IT sector. Upon starting his IT career path he quickly progressed into leadership roles as an engineer and developer for JP Morgan Chase.

With more than a decade of successful projects behind him, Arthur's love of academia brought him back to training, where he currently specializes in Java certification training and corporate software development. He holds numerous certifications including the Sun Certified Java Programmer, Sun Certified Web Component Developer, and Advanced PHP Programmer. His passion and aptitude for the subject matter is clearly evident both in and out of the classroom and NetCom Learning students rate him 8.6 out of 9.
Finnbarr M.
- Masters Degree in Computer Science from Boston University along with several certifications.
- Over 25 years of experience in the IT field and expert in Unix, GNU/Linux, and Oracle ecosystems.
- More than 10 years working as a Software Engineer in multinational companies such as Hewlett-Packard.

Bio:

Finnbarr has both breadth and in-depth knowledge of Unix, GNU/Linux, and Oracle with 25+ years of experience in operating system internals development, system administration, application development and project management on a wide variety of hardware and software platforms. As a Software Engineer, he developed and managed numerous projects in multinational companies such as Hewlett-Packard.

Finnbarr is a member of the Institute of Electrical and Electronic Engineers as well as a Moderator at unix.com. He is also a top Instructor and Subject Matter Expert at NetCom Learning and is well recognized by the students for his knowledge and his great teaching technique.
Ramesh P.
Ramesh holds a Masters Degree in Computer Science with specialization in Information Security and is pursuing his Doctoral degree in IT from the University of South Australia (UniSA). He is a one of a kind trainer - he has been working in the IT field since 1995 and is an expert in C#, VB.NET, ASP.NET, Java/J2EE, PL/SQL, VB, ASP, and XML technologies. Ramesh also has extensive experience developing and implementing BizTalk and SharePoint in large corporations, as well as more than 10 years experience working with Oracle and SQL server/Sybase databases. With more than 19 certifications, Ramesh is an IT guru and trainer with worldwide experience, which includes presentations and trainings across US, Asia, and Middle East. He is a full time instructor at NetCom Learning and we couldn't be happier in having him as one of our Subject Matter Experts.
Amanpreet M.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

The course material is in-depth and the instructors are knowledgeable.

-Stuart S.
Course(s) Taken

» Oracle DBA Track (11g) Release 2 Combo

The instructor was very knowledgeable and helpful and the office is enthusiastic about getting the right courses for you.

-Stuart S.
Course(s) Taken

» Oracle DBA Track (11g) Release 2 Combo

Convenient location. Knowledgeable instructors.

-Erica B.
Course(s) Taken

» Oracle DBA Track (11g) Release 2 Combo

  More testimonials »  

Back to Top

Ways to contact us

Back to Top