Oracle 12c Security Administration

5 Day | Instructor Led

In this course, you will learn about security and maintenance concerns in an Oracle database with an introductory focus on Oracle SQL and PL/SQL for newer IT employees.

Inquire About
Oracle 12c Security Administration

Ideal Candidates for Oracle 12c Security Administration Class

Database administrators
Support engineers
Technical consultants
Systems administrators
Network managers
Technical support personnel

Oracle 12c Security Administration Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Oracle 12c Security Administration

What You'll Learn in Oracle 12c Security Administration

Create and administer user accounts in the Oracle 11g database
Backup and recover the database
Monitor, troubleshoot, and maintain the database

No Certification Test Available For This Course

No Certification Test Available For This Course

Oracle 12c Security Administration Outline

1. SQL and PL/SQL

  • Basic SQL Syntax
  • SQL Functions
  • Advanced SQL Queries
  • PL/SQL Program Structure
  • Accessing the Database

2. Create an Oracle Database

  • Describe Oracle Database Architecture
  • Understand the Instance Architecture
  • Use the Management Framework and the Database Creation Assistant

3. Controlling the Database

  • Start and Stop the Agent and the Listener
  • Startup and Shutdown the Database

4. Administering Users

  • Create and Manage Database User Accounts, and Manage Roles
  • Grant and Revoke Privileges
  • Control Resource Usage by Users

5. Managing Schema Objects

  • Create and Modify Tables, Indexes, and Views
  • Define Constraints
  • View the Attributes and the Contents of a Table

6. Oracle Database Security

  • Apply the Principal of Least Privilege
  • Manage Default User Accounts
  • Implement Standard Password Security Features
  • Audit database activity

7. Proactive Maintenance: Objectives

  • Set Warning and Critical Alert Thresholds
  • Collect and Use Baseline Metrics
  • Use Tuning/Diagnostic Advisors/ADDM/ADR

8. Recovery Manager Configuration

  • Parameters Affecting RMAN
  • Use of a Flashback Recovery Area
  • The CONFIGURE Command
  • Persistent Settings
  • NOCATALOG / CATALOG Mode
  • Channel Allocation
  • Controlfile Autobackup
  • Retention Policies

9. Recovery Manager Operations

  • Using the BACKUP Command
  • Creating Backup Sets / Image Copies
  • Compressed Backups
  • Incremental Backups
  • Block Change Tracking
  • RMAN Backup Monitoring
  • REPORT and LIST Commands

10. Non-Critical Loss Recovery

  • Password and Network Files
  • Read-Only Tablespaces
  • Temporary Tablespaces
  • Index Tablespaces
  • Redo Log Members / Control Files

11. Database Recovery

  • Complete Recovery
  • Incomplete Recovery

12. Flashback Database

  • When in Use
  • Configuration and Use
  • Monitoring Flashback Database
  • Flash Recovery Area Maintenance
  • Flash Recovery Area Monitoring

13. User Error Recovery

  • The New Recycle Bin
  • Querying Dropped Tables
  • Flashback Versions Table
  • Flashback Transaction Query

14. Automatic Database Management

  • Management and Advisory Framework
  • Automatic Statistics Collection
  • The Automated Workload Repository
  • Database Advisors
  • Automatic Statistics Collection

15. Virtual Private Database

  • Row Level Control
  • Column Level Control

16. Oracle Auditing

  • Full Security Monitoring

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Certified Ethical Hacker (CEH)

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv8 course-ware. Latest tools and exploits uncovered from the underground community are featured in the new package.


CompTIA Cybersecurity Analyst (CSA+)

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.


CompTIA Security+ SY0-501

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.


© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W