Oracle 12c Security Administration

5 Day | Instructor Led

In this course, you will learn about security and maintenance concerns in an Oracle database with an introductory focus on Oracle SQL and PL/SQL for newer IT employees.

Inquire About
Oracle 12c Security Administration

Ideal Candidates for Oracle 12c Security Administration Class

Database administrators
Support engineers
Technical consultants
Systems administrators
Network managers
Technical support personnel

Oracle 12c Security Administration Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Oracle 12c Security Administration

What You'll Learn in Oracle 12c Security Administration

Create and administer user accounts in the Oracle 11g database
Backup and recover the database
Monitor, troubleshoot, and maintain the database

No Certification Test Available For This Course

No Certification Test Available For This Course

Oracle 12c Security Administration Outline

1. SQL and PL/SQL

  • Basic SQL Syntax
  • SQL Functions
  • Advanced SQL Queries
  • PL/SQL Program Structure
  • Accessing the Database

2. Create an Oracle Database

  • Describe Oracle Database Architecture
  • Understand the Instance Architecture
  • Use the Management Framework and the Database Creation Assistant

3. Controlling the Database

  • Start and Stop the Agent and the Listener
  • Startup and Shutdown the Database

4. Administering Users

  • Create and Manage Database User Accounts, and Manage Roles
  • Grant and Revoke Privileges
  • Control Resource Usage by Users

5. Managing Schema Objects

  • Create and Modify Tables, Indexes, and Views
  • Define Constraints
  • View the Attributes and the Contents of a Table

6. Oracle Database Security

  • Apply the Principal of Least Privilege
  • Manage Default User Accounts
  • Implement Standard Password Security Features
  • Audit database activity

7. Proactive Maintenance: Objectives

  • Set Warning and Critical Alert Thresholds
  • Collect and Use Baseline Metrics
  • Use Tuning/Diagnostic Advisors/ADDM/ADR

8. Recovery Manager Configuration

  • Parameters Affecting RMAN
  • Use of a Flashback Recovery Area
  • The CONFIGURE Command
  • Persistent Settings
  • Channel Allocation
  • Controlfile Autobackup
  • Retention Policies

9. Recovery Manager Operations

  • Using the BACKUP Command
  • Creating Backup Sets / Image Copies
  • Compressed Backups
  • Incremental Backups
  • Block Change Tracking
  • RMAN Backup Monitoring
  • REPORT and LIST Commands

10. Non-Critical Loss Recovery

  • Password and Network Files
  • Read-Only Tablespaces
  • Temporary Tablespaces
  • Index Tablespaces
  • Redo Log Members / Control Files

11. Database Recovery

  • Complete Recovery
  • Incomplete Recovery

12. Flashback Database

  • When in Use
  • Configuration and Use
  • Monitoring Flashback Database
  • Flash Recovery Area Maintenance
  • Flash Recovery Area Monitoring

13. User Error Recovery

  • The New Recycle Bin
  • Querying Dropped Tables
  • Flashback Versions Table
  • Flashback Transaction Query

14. Automatic Database Management

  • Management and Advisory Framework
  • Automatic Statistics Collection
  • The Automated Workload Repository
  • Database Advisors
  • Automatic Statistics Collection

15. Virtual Private Database

  • Row Level Control
  • Column Level Control

16. Oracle Auditing

  • Full Security Monitoring


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

Advanced Cyber Range Environment (ACRE) - Ransomware Exercise

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.

Certified Ethical Hacker (CEH)

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEH courseware. Latest tools and exploits uncovered from the underground community are featured in the new package.

CompTIA Cybersecurity Analyst (CSA+)

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.

© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W