Oracle Database Security - Preventive Controls
In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization.
COURSE SCHEDULE
Oracle Database Security - Preventive Controls
Length Days: 5
Length Hours: 40
This course is intended for Administrator, Database Administrator, Network Administrator and Systems Administrator.
Upon successful completion of this course, students will be able to:
- Configure and use Transparent Data Encryption,
- Understand and use Oracle Key Vault,
- Understand Oracle Data Redaction,
- Understand and use Oracle Data Masking and Subsetting,
- Understand security risks and identify appropriate Oracle solutions,
- Configure general authentication and authorization,
- Understand and implement Global Users,
- Set up and maintain a simple wallet,
- Install and use Oracle Database Vault,
- Configure and use Transparent Sensitive Data Protection.
COURSE OUTLINE
1 - INTRODUCTION
Course Objectives
Related courses and where this fits
Course Schedule and Appendices
2 - USING BASIC AND STRONG USER AUTHENTICATION
Basic Authentication
Strong Authentication
Database Link Passwords Protection
Security of Roles
3 - CONFIGURING GLOBAL USER AUTHENTICATION
About Enterprise User Management (EUS)
EUS and LDAP Integration
4 - USING PROXY AUTHENTICATION
Security Challenges of Three-Tier Computing
Proxy Authentication Solutions
5 - ENCRYPTION CONCEPTS AND SOLUTIONS
Concepts
Solutions
Oracle Solutions
6 - USING BUILT-IN ENCRYPTION IN APPLICATIONS
Usage
7 - USING TRANSPARENT DATA ENCRYPTION (TDE)
Overview
The Master Keys and the Keystore
Hardware Keystore
Encryption
8 - DATABASE STORAGE SECURITY
RMAN and OSB Backups
RMAN Encryption Modes
Data Pump Export and Import of Encrypted Data
9 - INTRODUCTION TO ORACLE KEY VAULT
What is Oracle Key Vault?
Using Oracle Key Vault
10 - INSTALLING ORACLE KEY VAULT
Installation
Endpoints
11 - USING ORACLE KEY VAULT
Reviewing or refreshing prerequisite knowledge
Contrasting Oracle Wallets and OKV Virtual Wallets
12 - ADMINISTERING ORACLE KEY VAULT
Roles in detail
Best practice tips for Oracle Key Vault
13 - AUTOMATED SENSITIVE DATA DISCOVERY
Overview
Application Data Modeling
Managing Application Data Models
14 - ORACLE DATA MASKING AND SUBSETTING OVERVIEW
Overview
15 - MASKING SENSITIVE DATA IN NON-PRODUCTION ENVIRONMENTS
Exploring Data Masking Format Library
Data Masking Transformations
16 - SUBSETTING DATA
Exploring Data Subsetting definitions
17 - MANAGING DATA MASKING AND SUBSETTING
Administering Data Masking and Subsetting
Heterogeneous masking and subsetting
Best Practices
18 - ORACLE ADVANCED SECURITY - DATA REDACTION
Need to redact or dynamically mask data
Implementing Data Redaction
Data Redaction usage guidelines
19 - ORACLE TRANSPARENT SENSITIVE DATA PROTECTION (TSDP)
TSDP Implementation
20 - ORACLE DATABASE VAULT OVERVIEW
Understand Database Vault Controls
What is a Realm? A Rule Set? A Command Rule? A Secure Application Role?
What are Factors and Identities? Component Relationships and Evaluation?
Database Vault Effects and Example
Software Overview: API, Views, and Integration with Other Oracle Products
21 - CONFIGURING DATABASE VAULT
Configuring Database Vault
Database Vault Roles and Schema
What to Expect After You Enable Database Vault
Securing Data in Multitenant Environments
Configuring Database Vault Users in Cloud Control 12c
22 - ANALYZING PRIVILEGES
Privilege Analysis Overview and Features
How Does it Work?
What are The Types of Analysis, Tools, and Prerequisites?
Managing Privilege Analysis Policies
Use Cases
Actual course outline may vary depending on offering center. Contact your sales representative for more information.