Oracle Database Security Audit Training Course with Pete Finnigan
Starting dates and places
Description
This seminar teaches the students how to confidently perform a security audit on Oracle Database. The course explains why Oracle databases are invariably insecure and examines where to look for issues, what to look for and why. The course shows how a security audit is planned, how to prepare yourself, your staff and your environment. The course explores the fundamentals of how to review a database and why it is necessary. This will enable students to understand why something is an issue, how to verify that it is an issue and to understand the implications on their own databases and applications before using pre-built or commercial tools.
A Live Virtual Class (LVC) is exclusively for register…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
This seminar teaches the students how to confidently perform a security audit on Oracle Database. The course explains why Oracle databases are invariably insecure and examines where to look for issues, what to look for and why. The course shows how a security audit is planned, how to prepare yourself, your staff and your environment. The course explores the fundamentals of how to review a database and why it is necessary. This will enable students to understand why something is an issue, how to verify that it is an issue and to understand the implications on their own databases and applications before using pre-built or commercial tools.
A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording, copying, or transmission of LVC content may not be made.
Audience
- Database Designers
- Developer
- Database Administrators
Course Topics Oracle security tools, checklists and more Planning an audit, setting up for an audit, gathering tools, prepping laptop, people, access Software installed, versions and attack surface Auditing the Oracle Database association with the file system Audit Oracle networking Audit the database configuration Specialist considerations, credit cards, personally identifiable data and more Review the audit trail Data analysis, vulnerability assessment
Course Objectives
- Understand why and how hackers can attack a database
- Learn how to plan an audit and implement all the ground work necessary in carrying out an audit
- Learn how to document the audit process fully and present the results to management
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.