Oracle 12c Database Administration I

5 Day | Instructor Led

In this course, you will learn about the Oracle Server architecture, expand the size of the database, implement security, and how to perform specific database administration tasks.

Inquire About
Oracle 12c Database Administration I

Ideal Candidates for Oracle 12c Database Administration I Class

Data analysts
Database administrators
Systems administrators
Network managers
Technical support personnel

Oracle 12c Database Administration I Prerequisites

Knowledge of SQL

What You'll Get in Oracle 12c Database Administration I

What You'll Learn in Oracle 12c Database Administration I

Oracle Server Architecture
Install Oracle Server Software
Start and Stop an Oracle Database
Manage Tablespaces and Undo Segments
Create an Oracle Database
Create Tables, Constraints, and Indexes
Create All Other Database Objects
Manage Redo Logs
Manage Tablespaces and Datafiles
Manage Controlfiles
Manage Security
Audit the Database
Manage Oracle Networking
Perform Appropriate Backups
Perform Complete and Incomplete Recoveries

No Certification Test Available For This Course

No Certification Test Available For This Course

Oracle 12c Database Administration I Outline

1. Introduction and Duties of the DBA

  • Oracle RDBMS Components
  • DBA Responsibilities

2. Tables, Constraints, and Indexes

  • Introduction to Datatypes and Tables
  • Integrity Constraints
  • Temporary Tables, Partitioned Tables, External Tables, and IOTs
  • Indexes and Skip Scanning
  • Online Reorganization
  • Database Workspace Management

3. Other Database Schema Objects

  • DDL Commands used
  • Views, Materialized views
  • Sequences, Synonyms, Database Links
  • Outlines, Dimensions, Hierarchies
  • PL/SQL Program Units
  • Supplied Packages
  • Oracle Data Dictionary
  • Storage of Large Objects (BFILEs, BLOBs, CLOBs)

4. Starting and Stopping the Database

  • What Tool to Use?
  • Connecting as a Privileged User
  • Password file authentication
  • Starting a Database
  • Shutting Down a Database
  • Reading the Alert Log / Trace Files
  • Quiescing the database
  • SPFILE / Parameter management

5. How Space is Physically Consumed - Blocks and Extents

  • Basic Definitions
  • Blocks and Extents
  • Fragmentation / Deallocation

6. How Space is Logically Consumed - Segments

  • Introduction to Segments
  • Managing Undo Segments
  • Automatic Undo Management
  • Managing Sort Activity
  • Managing Data Segments
  • Managing Index Segments
  • Monitoring Database segments

7. Managing Tablespaces - Default behavior of CREATE TABLESPACE command

  • Tablespace Overview
  • System Tablespace
  • Types of Tablespaces
  • Creating additional tablespaces
  • Altering Tablespaces
  • Temporary Tablespaces - Default Temporary Tablespaces
  • Tablespace Quotas
  • Monitoring Tablespaces

8. Basic Oracle Architecture

  • Architecture Overview
  • Database Structures
  • Process Structures
  • Memory Structures - SGA
  • Memory Structures - PGA
  • Alternative Configurations

9. Oracle Database Files

  • Basic Structures of an Oracle RDBMS
  • Data Files
  • Redo Log Files
  • Archived Redo Log Files
  • Control Files
  • Oracle-Managed Files (OMF)

10. Users and Security

  • Managing Database Users
  • System / Object Privileges
  • Managing Roles / Profiles
  • Resource and Password Management
  • The Virtual Private Database

11. Networking

  • Duties of the DBA for Networking
  • Overview of Oracle Network Architecture
  • Name Resolution
  • Oracle Net Client Configuration
  • Oracle Net Server Configuration
  • Tools
  • Configuring the Listener
  • Shared Server

12. Physical NOARCHIVELOG Mode Backups

  • Oracle Database Backups
  • Automatic Recovery Architecture
  • NOARCHIVELOG Mode
  • ARCHIVELOG Mode
  • Physical Backups
  • Closed Backups in NOARCHIVELOG Mode

13. Configuring Archivelog Mode

14. Physical ARCHIVELOG Mode Backups

  • Configuration of the database for archiving
  • Setting the ARCHIVELOG mode
  • Establishing multiple archiving destinations
  • Closed backups in ARCHIVELOG mode
  • Open backups in ARCHIVELOG mode
  • Controlfile Backup

15. Complete Recovery

  • Recovery Structures and Processes
  • Recovery in NOARCHIVELOG and ARCHIVELOG Mode

16. Incomplete Recovery

  • What is Incomplete Recovery?
  • Recovering from Loss of Current Redo Log Files

17. Data Loading

  • SQL*Loader
  • External Tables Data Pump

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Avaya Aura Messaging Implementation, Administration, and Support

In this course, you will acquire the skills needed to customize and administer the implementation and support of Avaya Aura Messaging (AAM). The course provides you with the opportunity to practice configuring Avaya Aura Messaging.


Avaya Aura® Communication Manager Administration and Call Center Elite Fast Track

This course combines the Avaya Aura Communication Manager Administration and the Avaya Aura Call Center Elite Implementation and Configuration courses. It is offered as a condensed, five-day fast track version of those two courses.


Advanced Dashboards and Visualizations

This one day course is designed for power users who want to create complex dashboards, forms, and visualizations. Its emphasis is on editing simple XML to create dashboards that use tokens, post-process searches, dynamic drilldowns, and custom stylesheets. Students also use custom JavaScript to add advanced visualizations and behaviors to dashboards.


© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W