Oracle Database 11g: Implement Database Vault
Oracle Database Vault helps an organization meet their security goals. There are more and more requirements being put on systems regarding separation of duties and privacy and protection of data, including insider threats. DBAs and security administrators need to understand these requirements, and also the tools available for meeting them. This course introduces the student to the Database Vault product, including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices.
Learn To:- Implement security policies
- Comply with security regulations
- Protect data privacy and integrity
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Oracle Database Vault helps an organization meet their security goals. There are more and more requirements being put on systems regarding separation of duties and privacy and protection of data, including insider threats. DBAs and security administrators need to understand these requirements, and also the tools available for meeting them. This course introduces the student to the Database Vault product, including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices.
Learn To:- Implement security policies
- Comply with security regulations
- Protect data privacy and integrity
A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording, copying, or transmission of LVC content may not be made.
Audience
- Functional Implementer
- Security Administrators
- Security Compliance Auditors
- Security Compliance Professionals
- Technical Administrator
- Technical Consultant
- Database Administrators
Course Topics Introduction
- Need for Security Compliance
- Compare and contrast Relevant Existing Security Features
- Overview of Database Vault Elements and Functionality
- Database Vault Administrator
- Reporting and Monitoring
- The Database Vault API
- Installation Tasks
- Logging in the Database Vault Administrator
- Tools and Components
- Database Vault database accounts
- Realms Concepts
- Realm Territories
- Realm Authorizations
- Managing realms
- · Factors Concepts
- Factor types
- Factor identification
- Retrieval method
- Validation method
- Managing factors
- OLS Merging algorithms
- Identities concepts
- Purpose of Identities
- Trust levels
- Managing Identities
- Mapping Identities
- Labeling Identities
- Rule Sets: Concepts
- Purpose and benefits
- Evaluation options
- Audit options
- Error handling options
- Managing rule sets
- Command rules : Concepts
- Example scenarios
- Creating and editing command rules
- Command rules : Examples implemented
- Secure Application Roles: Concepts
- Creating and Editing Secure Application Roles
- Deleting Secure Application Roles
- Examples
- Account Management reports
- Application Security reports
- Auditing reports
- Configuration reports
- Accounts and Roles reports
- System Privileges reports
- Identifying your security requirements
- Suggested naming conventions
- Separation of duty best practices
- Identifying your security requirements
- Audit all violations
- Connection pooling considerations
- Performance considerations
Course Objectives
- Install and configure Database Vault
- Audit Database Vault activities
- Configure Factors, Identities, and Realms to implement security
- Use attributes such as time of day and IP address to determine users’ privileges
- Effectively use the Database Vault administration interface
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
