Oracle Database 12c: Security

Go to class
Write Review

Free Online Course: Oracle Database 12c: Security provided by LinkedIn Learning is a comprehensive online course, which lasts for 3-4 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Oracle Database 12c: Security is taught by David Yahalom.

Overview
  • Learn how to secure, protect, and harden an Oracle 12c database by configuring users, permissions and privileges, roles, auditing, and encryption.

Syllabus
  • Introduction

    • Welcome
    • What you need to know
    • Exercise files
    1. Database Security Fundementals
    • Why database security is important
    • Authentication an database users
    • Authorization and permissions
    2. Advanced Database Security Concepts
    • Database auditing
    • Database encryption
    • Roles of DBAs in Oracle security
    3. Download and Set Up the Course VM
    • Download the course VM
    • Enable archive mode
    4. Users and Permissions
    • Users, schemas, and the SYSDBA
    • Create new database users
    • Grant and evoke system privileges
    • Grant database-wide system privileges
    • Tablespace quotas
    • Object permissions
    • Password management policies
    • The WITH GRANT and WITH ADMIN options
    • Enforce password complexity
    • Viewing users, permissions, and polices
    • Deleting a database user
    • Local vs. common user concepts
    • Creating local users
    • Creating common users
    • Separating object owners and access
    5. Database Roles
    • Introduction to database roles
    • Creating, assigning, and dropping roles
    • Viewing existing roles and role grants
    • Roles with ADMIN OPTION
    6. Auditing Access to Data
    • Configure audit parameters
    • Creating unified audit policies
    • Testing audit polices
    • View the audit trail
    • Using standard auditing
    • Fine-grained auditing
    • Manage the audit trail
    7. Data Encryption
    • Configure the keystore
    • Create encryption key
    • Encryping data in tables
    • Encrypting tablespaces
    • Encrypting Data Pump backups
    • Encrypting RMAN Backups
    • Restore encrypted RMAN Backup
    • Open the wallet after DB restart
    Conclusion
    • What's next?