RSS
GoldenLine
Facebook
Nowoczesna Firma
Blog
Tablet 7"
z Androidem 4.4
Tablet 10 cali dla uczestników
dla uczestników



Oracle Database Security: Preventive Controls Ed 1 (D90836GC10)

Tablet Lenovo (7"/8GB/WiFi/Android) gratis*!

Do szkoleń autoryzowanych Oracle 3, 4 lub 5 dniowych w formacie ILT, zamówionych w Database Consulting.
*Promocja ważna do wyczerpania zapasów lub do odwołania i nie łączy się z innymi promocjami ani zniżkami

Autoryzacja

Szkolenie autoryzowane Oracle

Format prowadzenia szkolenia

ILT - szkolenie klasyczne, w sali szkoleniowej, z trenerem

Terminy szkoleń otwartych

LokalizacjaPoczątekCzas trwaniaJęzyk wykładowy*Cena za osobę
PL - Warszawa23-PAŹ-20175 dniPolish8890
PL - Warszawa27-LIS-20175 dniPolish8890
*Oznacza język jakim posługuje się Trener prowadzący szkolenie.
Materiały szkoleniowe są najczęścej w języku angielskim

Szkolenie dostępne także w formacie

ILT - szkolenie klasyczne, w sali szkoleniowej, z trenerem
LVC/LWC - szkolenie zdalne, przez internet, z trenerem

Kod szkolenia

D90836GC10

Dla kogo

  • Database Administrators
  • Network Administrator
  • Security Administrators
  • Support Engineer
  • System Analysts

Czas trwania

5 dni

Cena bazowa

PLN 8890

Cel

  • Configure and use Transparent Data Encryption
  • Understand and use Oracle Key Vault
  • Understand Oracle Data Redaction
  • Understand and use Oracle Data Masking and Subsetting
  • Understand security risks and identify appropriate Oracle solutions
  • Configure general authentication and authorization
  • Understand and implement Global Users
  • Set up and maintain a simple wallet
  • Install and use Oracle Database Vault
  • Configure and use Transparent Sensitive Data Protection

Opis

In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and others, requires better security at the database level. Students learn how to secure the access to their databases and how to use the Oracle Database Security products and technologies that enhance data access and confidentiality. The course provides suggested Oracle solutions for common problems. Learn To:Choose Oracle Database Security products and technologies to meet security requirements.Secure the database access by database or enterprise users with basic or strong authentication such as SSL, Kerberos and Radius.Protect against database bypass by using Transparent Database Encryption.Use Oracle Wallets and Oracle Key Vault to manage encryption keys.Discover sensitive columns such as Credit Card Numbers by using Application Data Modeling.Minimize sensitive data proliferation to test/dev environments by using Data Masking.Minimize storage costs in test/dev environments by using Data Subsetting.Reduce sensitive data exposure in applications by using Data Redaction.Understand and use Oracle Database Vault. Benefits To YouThis course discusses the following security features of the database: authentication, data access control including user authorizations by using privileges and roles, data confidentiality including Data Redaction, Oracle Data Masking and Subsetting, Transparent Sensitive Data Protection, encryption at the column, tablespace and file levels by using Transparent Data Encryption. This course discusses the use of the Oracle Key Vault to centrally manage keys across the enterprise. Oracle Database Vault is used to enforce Separation of Duties at the DBA level. Hands-on practices and available demonstrations help students learn how to use most of the features of Oracle Database 12c to secure their data center, by using Oracle Enterprise Manager Cloud Control or other simple tools such as SQL*Plus.

Tematy

  1. Introduction
    • Course Objectives
    • Related courses and where this fits
    • Course Schedule and Appendices
  2. Using Basic and Strong User Authentication
    • Basic Authentication
    • Strong Authentication
    • Database Link Passwords Protection
    • Security of Roles
  3. Configuring Global User Authentication
    • About Enterprise User Management (EUS)
    • EUS and LDAP Integration
  4. Using Proxy Authentication
    • Security Challenges of Three-Tier Computing
    • Proxy Authentication Solutions
  5. Encryption Concepts and Solutions
    • Concepts
    • Solutions
    • Oracle Solutions
  6. Using Built-In Encryption in Applications
    • Usage
  7. Using Transparent Data Encryption (TDE)
    • Overview
    • The Master Keys and the Keystore
    • Hardware Keystore
    • Encryption
  8. Database Storage Security
    • RMAN and OSB Backups
    • RMAN Encryption Modes
    • Data Pump Export and Import of Encrypted Data
  9. Introduction to Oracle Key Vault
    • What is Oracle Key Vault?
    • Using Oracle Key Vault
  10. Installing Oracle Key Vault
    • Installation
    • Endpoints
  11. Using Oracle Key Vault
    • Reviewing or refreshing prerequisite knowledge
    • Contrasting Oracle Wallets and OKV Virtual Wallets
  12. Administering Oracle Key Vault
    • Roles in detail
    • Best practice tips for Oracle Key Vault
  13. Automated Sensitive Data Discovery
    • Overview
    • Application Data Modeling
    • Managing Application Data Models
  14. Oracle Data Masking and Subsetting overview
    • Overview
  15. Masking Sensitive Data in Non-Production Environments
    • Exploring Data Masking Format Library
    • Data Masking Transformations
  16. Subsetting Data
    • Exploring Data Subsetting definitions
  17. Managing Data Masking and Subsetting
    • Administering Data Masking and Subsetting
    • Heterogeneous masking and subsetting
    • Best Practices
  18. Oracle Advanced Security - Data Redaction
    • Need to redact or dynamically mask data
    • Implementing Data Redaction
    • Data Redaction usage guidelines
  19. Oracle Transparent Sensitive Data Protection (TSDP)
    • TSDP Implementation
  20. Oracle Database Vault Overview
    • Understand Database Vault Controls
    • What is a Realm? A Rule Set? A Command Rule? A Secure Application Role?
    • What are Factors and Identities? Component Relationships and Evaluation?
    • Database Vault Effects and Example
    • Software Overview: API, Views, and Integration with Other Oracle Products
  21. Configuring Database Vault
    • Configuring Database Vault
    • Database Vault Roles and Schema
    • What to Expect After You Enable Database Vault
    • Securing Data in Multitenant Environments
    • Configuring Database Vault Users in Cloud Control 12c
  22. Analyzing Privileges
    • Privilege Analysis Overview and Features
    • How Does it Work?
    • What are The Types of Analysis, Tools, and Prerequisites?
    • Managing Privilege Analysis Policies
    • Use Cases

Wymagania

    • Create and manage users, roles, and privileges
    • Use Oracle Data Pump export and import and Perform RMAN back
    • Create and manage tables and tablespaces
    • Use Flashback Data Archive and Create PL/SQL procedures
    • Create PL/SQL procedures
    • Familarity with SQL*Plus, SQL*Developer
    • Familarity with Oracle Enterprise Manager Cloud Control

Zgłaszanie chęci uczestnictwa

W celu zgłoszenia chęci uczestnictwa w szkoleniu prosimy o pobranie i wypełnienie formularza lub wygenerowanie go ze strony, a następnie przeslanie faksem na numer (22) 398 47 82.

Pobierz formularz zgłoszenia w formacie DOC
Pobierz formularz zgłoszenia w formacie PDF

Jeśli potrzebują Państwo wsparcia, mają pytania lub chcą się upewnić odnośnie wyboru szkolenia prosimy o kontakt pod numerem 0-801 009 706. Nasi przedstawiciele chętnie odpowiedzą na Państwa pytania oraz pomogą w podjęciu trafnej decyzji.