Oracle Database 10g Security

Day 1

  • Introduction
  • Lesson 1 : Understanding Security Requirements
  • Lesson 2 : Choosing Security Solutions
  • Lesson 3 : Applying Internal Database Security
  • Lesson 4 : Auditing Database Users, Privileges, and Objects
  • Lesson 5 : Auditing DML Statements

Day 2

  • Lesson 6 : Using Basic User Authentication
  • Lesson 7 : Using Strong Authentication
  • Lesson 8 : Using Enterprise User Security
  • Lesson 9 : Using Proxy Authentication
  • Lesson 10 : Using Privileges and Roles

Day 3

  • Lesson 11 : Using Application Contexts
  • Lesson 12 : Implementing Fine-Grained Access Control
  • Lesson 13 : Installing Oracle Label Security
  • Lesson 14 : Implementing Oracle Label Security
  • Lesson 15 : Encryption Concepts

Day 4

  • Lesson 16 : Using Application-Based Encryption
  • Lesson 17 : Applying Transparent Data Encryption
  • Lesson 18 : Applying File Encryption
  • Lesson 19 : Oracle Net Services: Security Checklists
  • Lesson 20 : Securing the Listener

Lesson 1 : Understanding Security Requirements

  • Describe fundamental security requirements
  • Define the following terms:
    • Least privilege
    • Authorization
    • Authentication
  • Describe security policies
  • Describe the concept of in-depth security

Lesson 2 : Choosing Security Solutions

  • Preventing exploits
  • Maintaining data integrity
  • Protecting data
  • Controlling data access

Lesson 3 : Applying Internal Database Security

  • Apply the principle of least privilege to the database
  • Apply security patches (Critical Patch Update)
  • Lock and expire default user accounts
  • Change default user passwords
  • Create strong passwords
  • Enforce password management
  • Protect the data dictionary

Lesson 4 : Auditing Database Users, Privileges, and Objects

  • Implement basic database auditing
  • Implement auditing of the privileged user
  • Implement DML and DDL auditing
  • Send audit records to OS files

Lesson 5 : Auditing DML Statements

  • Implement fine-grained auditing (FGA)
  • Maintain FGA policies
  • Implement an FGA audit event handler
  • Read FGA audit events from the FGA audit trail

Lesson 6 : Using Basic User Authentication

  • Authenticate users with passwords
  • Protect passwords
  • Authenticate users with the operating system (OS)
  • Restrict remote OS authentication
  • Protect database link passwords

Lesson 7 : Using Strong Authentication

  • Describe strong authentication by using:
    • Certificates
    • Kerberos
    • RADIUS
  • Describe a setup for strong authentication by using:
    • Certificates
    • Kerberos
    • KDC
  • Implement the secure external password store

Lesson 8 : Using Enterprise User Security

  • Describe Enterprise User Security
  • Set up Enterprise User Security
  • Create an enterprise user
  • Use shared schemas
  • Use enterprise roles
  • Audit enterprise users
  • Enable enterprise roles
  • Migrate users from the database to Oracle Internet Directory

Lesson 9 : Using Proxy Authentication

  • Describe how proxy authentication works
  • Manage users being authenticated by using proxy authentication
  • Audit users authenticated by proxy

Lesson 10 : Using Privileges and Roles

  • Implement roles
  • Implement the securing of objects through procedures
  • Describe how secure application roles work
  • Manage roles and users by using secure application roles

Lesson 11 : Using Application Contexts

  • Describe how an application context is used
  • Describe the sources of application context values
  • Implement a local context
  • Implement an application context that is accessed globally

Lesson 12 : Implementing Fine-Grained Access Control l

  • Describe how fine-grained access control (FGAC) and the Virtual Private Database (VPD) work
  • Implement FGAC or the VPD
  • Group policies

Lesson 13 : Installing Oracle Label Security

  • Describe Oracle Label Security
  • Install Oracle Label Security

Lesson 14 : Implementing Oracle Label Security

  • Creating policies
  • Defining labels
  • Setting up user authorizations
  • Applying policies to tables

Lesson 15 : Encryption Concepts

  • Understand the issues of encryption
  • Discuss challenges of encryption
  • Describe key management solutions
  • Describe the encryption options available with Oracle Database 10g

Lesson 16 : Using Application-Based Encryption

  • Use DBMS_CRYPTO to:
    • Generate random encryption keys
    • Encrypt and decrypt table columns

Lesson 17 : Applying Transparent Data Encryption

  • Set up the database master encryption key
  • Implement Transparent Data Encryption
  • Encrypt column data

Lesson 18 : Applying File Encryption

  • Use RMAN encrypted backups
  • Oracle Secure Backup
  • Use Data Pump export encryption

Lesson 19 : Oracle Net Services: Security Checklists

  • Describe the items on the client, listener, and network security checklists
  • Secure administration of the network
  • Restrict access by IP address
  • Encrypt network traffic

Lesson 20 : Securing the Listener

  • Describe how to limit the privileges of the listener
  • Administer the listener securely
  • Analyze listener log files

In-house price for 4 days

  • 82 ,000 baht(THB) : Small Class : 1 - 10 persons
  • 100,000 baht(THB) : Medium Class : 11 - 20 persons
  • 118,000 baht(THB) : Big Class : 21 - 30 persons
  • All prices exclude VAT 7 %

Printable Version ดาวน์โหลดหน้านี้ >>