Oracle 12c Security Administration

5 Day | Instructor Led

In this course, you will learn about security and maintenance concerns in an Oracle database with an introductory focus on Oracle SQL and PL/SQL for newer IT employees.

Inquire About
Oracle 12c Security Administration

Ideal Candidates for Oracle 12c Security Administration Class

Database administrators
Support engineers
Technical consultants
Systems administrators
Network managers
Technical support personnel

Oracle 12c Security Administration Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Oracle 12c Security Administration

What You'll Learn in Oracle 12c Security Administration

Create and administer user accounts in the Oracle 11g database
Backup and recover the database
Monitor, troubleshoot, and maintain the database

No Certification Test Available For This Course

No Certification Test Available For This Course

Oracle 12c Security Administration Outline

1. SQL and PL/SQL

  • Basic SQL Syntax
  • SQL Functions
  • Advanced SQL Queries
  • PL/SQL Program Structure
  • Accessing the Database

2. Create an Oracle Database

  • Describe Oracle Database Architecture
  • Understand the Instance Architecture
  • Use the Management Framework and the Database Creation Assistant

3. Controlling the Database

  • Start and Stop the Agent and the Listener
  • Startup and Shutdown the Database

4. Administering Users

  • Create and Manage Database User Accounts, and Manage Roles
  • Grant and Revoke Privileges
  • Control Resource Usage by Users

5. Managing Schema Objects

  • Create and Modify Tables, Indexes, and Views
  • Define Constraints
  • View the Attributes and the Contents of a Table

6. Oracle Database Security

  • Apply the Principal of Least Privilege
  • Manage Default User Accounts
  • Implement Standard Password Security Features
  • Audit database activity

7. Proactive Maintenance: Objectives

  • Set Warning and Critical Alert Thresholds
  • Collect and Use Baseline Metrics
  • Use Tuning/Diagnostic Advisors/ADDM/ADR

8. Recovery Manager Configuration

  • Parameters Affecting RMAN
  • Use of a Flashback Recovery Area
  • The CONFIGURE Command
  • Persistent Settings
  • NOCATALOG / CATALOG Mode
  • Channel Allocation
  • Controlfile Autobackup
  • Retention Policies

9. Recovery Manager Operations

  • Using the BACKUP Command
  • Creating Backup Sets / Image Copies
  • Compressed Backups
  • Incremental Backups
  • Block Change Tracking
  • RMAN Backup Monitoring
  • REPORT and LIST Commands

10. Non-Critical Loss Recovery

  • Password and Network Files
  • Read-Only Tablespaces
  • Temporary Tablespaces
  • Index Tablespaces
  • Redo Log Members / Control Files

11. Database Recovery

  • Complete Recovery
  • Incomplete Recovery

12. Flashback Database

  • When in Use
  • Configuration and Use
  • Monitoring Flashback Database
  • Flash Recovery Area Maintenance
  • Flash Recovery Area Monitoring

13. User Error Recovery

  • The New Recycle Bin
  • Querying Dropped Tables
  • Flashback Versions Table
  • Flashback Transaction Query

14. Automatic Database Management

  • Management and Advisory Framework
  • Automatic Statistics Collection
  • The Automated Workload Repository
  • Database Advisors
  • Automatic Statistics Collection

15. Virtual Private Database

  • Row Level Control
  • Column Level Control

16. Oracle Auditing

  • Full Security Monitoring

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Avaya Aura Messaging Implementation, Administration, and Support

In this course, you will acquire the skills needed to customize and administer the implementation and support of Avaya Aura Messaging (AAM). The course provides you with the opportunity to practice configuring Avaya Aura Messaging.


Avaya Aura® Communication Manager Administration and Call Center Elite Fast Track

This course combines the Avaya Aura Communication Manager Administration and the Avaya Aura Call Center Elite Implementation and Configuration courses. It is offered as a condensed, five-day fast track version of those two courses.


Advanced Dashboards and Visualizations

This one day course is designed for power users who want to create complex dashboards, forms, and visualizations. Its emphasis is on editing simple XML to create dashboards that use tokens, post-process searches, dynamic drilldowns, and custom stylesheets. Students also use custom JavaScript to add advanced visualizations and behaviors to dashboards.


© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W