Oracle Database 12c: Security (D81599)

Oracle Database 12c: Security (D81599)


Duration: 5 days

This Oracle Database 12c: Security training teaches you how you can use Oracle Database features to meet the security, privacy and compliance requirements of your organization. You’ll get the chance to interact with expert Oracle University instructors through a combination of instruction and hands-on exercises that reinforce new concepts.

Learn To:

  • Understand Oracle security solutions and how they can help address your security requirements.
  • Configure strong authentication for database users using PKI and Kerberos.
  • Control data access using virtual private database and Oracle Label Security.
  • Analyze application privileges and reduce the attack surface using Oracle Database Vault Privilege Analysis.
  • Reduce risk of data exposure using Oracle Advanced Security Data Redaction, Transparent Data Encryption and Oracle Data Masking and Subsetting.
  • Audit activity inside the database using policy and condition based unified auditing.
  • Configure network encryption to protect information in transit.
  • Audit activity inside the database using policy and condition based unified auditing.
  • Protect against application bypass using Oracle Database Vault Realms.


Upon completing this course, the learner will be able to meet these overall objectives:
  • Ensure data confidentiality using an encryption solution like Transparent Data Encryption, or Data Redaction or Oracle Data Masking and Subsetting
  • Audit user actions using any of the auditing features like unified auditing
  • Find appropriate Oracle solutions to meet the security, privacy and compliance requirements of their organization
  • Find solutions to secure database access through the network
  • Configure appropriate authentication for the database or enterprise users in the organization
  • Control data access and integrity in their organization using the appropriate feature or option or product like privileges or Oracle Label Security
  • Analyze any security risks of their organization
Module 1: Introduction

Module 2: Understanding Security Requirements

Module 3: Choosing Security Solutions

Module 4: Implementing Basic Database Security

Module 5: Securing Data on the Network

Module 6: Using Basic and Strong User Authentication

Module 7: Configuring Global User Authentication

Module 8: Using Proxy Authentication

Module 9: Using Privileges and Roles

Module 10: Using Privilege Analysis

Module 11: Using Application Contexts

Module 12: Implementing Virtual Private Database

Module 13: Implementing Oracle Label Security

Module 14: Redacting Data

Module 15: Using Oracle Data Masking and Subsetting

Module 16: Using Transparent Sensitive Data Protection

Module 17: Encryption Concepts and Solutions

Module 18: Encrypting with DBMS_CRYPTO Package

Module 19: Using Transparent Data Encryption

Module 20: Database Storage Security

Module 21: Using Unified Audit

Module 22: Using Fine-Grained Audit
  • Good knowledge of Oracle Database

Suggested Prerequisites:

  • Perform RMAN backup and recovery
  • Use Oracle Data Pump export and import
  • Create and manage users, roles, and privileges
  • Administer listeners
Course ID:

Show Schedule for: