Oracle Database 11g: Implement Database Vault

Total time

Oracle Database 11g: Implement Database Vault

Oracle University
Logo Oracle University
Provider rating: starstar_borderstar_borderstar_borderstar_border 2 Oracle University has an average rating of 2 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
There are no known starting dates for this product.
  • View related products with starting dates: Oracle 11G.

Description

Oracle Database Vault helps an organization meet their security goals. There are more and more requirements being put on systems regarding separation of duties and privacy and protection of data, including insider threats. DBAs and security administrators need to understand these requirements, and also the tools available for meeting them. This course introduces the student to the Database Vault product, including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices.

Learn To:
  • Implement security policies
  • Comply with security regulations
  • Protect data privacy and integrity

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Oracle 11G, CompTIA A+ / Network+ / Security+, Oracle, IT Security, and Retail (Management).

Oracle Database Vault helps an organization meet their security goals. There are more and more requirements being put on systems regarding separation of duties and privacy and protection of data, including insider threats. DBAs and security administrators need to understand these requirements, and also the tools available for meeting them. This course introduces the student to the Database Vault product, including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices.

Learn To:
  • Implement security policies
  • Comply with security regulations
  • Protect data privacy and integrity

A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording, copying, or transmission of LVC content may not be made.


Audience
  • Functional Implementer
  • Security Administrators
  • Security Compliance Auditors
  • Security Compliance Professionals
  • Technical Administrator
  • Technical Consultant
  • Database Administrators

Course Topics Introduction
  • Need for Security Compliance
  • Compare and contrast Relevant Existing Security Features
  • Overview of Database Vault Elements and Functionality
  • Database Vault Administrator
  • Reporting and Monitoring
  • The Database Vault API
Installing Database Vault
  • Installation Tasks
  • Logging in the Database Vault Administrator
  • Tools and Components
  • Database Vault database accounts
Configuring Realms
  • Realms Concepts
  • Realm Territories
  • Realm Authorizations
  • Managing realms
Defining Factors
  • · Factors Concepts
  • Factor types
  • Factor identification
  • Retrieval method
  • Validation method
  • Managing factors
  • OLS Merging algorithms
Defining Identities
  • Identities concepts
  • Purpose of Identities
  • Trust levels
  • Managing Identities
  • Mapping Identities
  • Labeling Identities
Defining Rule Sets
  • Rule Sets: Concepts
  • Purpose and benefits
  • Evaluation options
  • Audit options
  • Error handling options
  • Managing rule sets
Configuring Command Rules
  • Command rules : Concepts
  • Example scenarios
  • Creating and editing command rules
  • Command rules : Examples implemented
Configuring Secure Application Roles
  • Secure Application Roles: Concepts
  • Creating and Editing Secure Application Roles
  • Deleting Secure Application Roles
  • Examples
Viewing Database Vault reports
  • Account Management reports
  • Application Security reports
  • Auditing reports
  • Configuration reports
  • Accounts and Roles reports
  • System Privileges reports
Implementing Best Practices
  • Identifying your security requirements
  • Suggested naming conventions
  • Separation of duty best practices
  • Identifying your security requirements
  • Audit all violations
  • Connection pooling considerations
  • Performance considerations

Course Objectives
  • Install and configure Database Vault
  • Audit Database Vault activities
  • Configure Factors, Identities, and Realms to implement security
  • Use attributes such as time of day and IP address to determine users’ privileges
  • Effectively use the Database Vault administration interface

There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.