
Practical Oracle Database Security
Practical Oracle Database Security
Intermediate
5( 3 Reviews )
6 hrs 13 mins
Cloud Security
Strengthen the security of your Oracle Database environments with in-built and external security measures.
Strengthen the security of your Oracle Database environments with in-built and external security measures.
Upgrade to Pro +
Gain hands-on experience, enhance your expertise, and achieve mastery in cybersecurity with our Pro plans.
Master New Skills with 700+ Courses
Advance Your Career with Learning Paths
Gain Practical Experience with 800+ Practice Labs
Tackle Real-World Challenges with CTFs
Achieve Recognition with Essential Certifications
A Shareable Certificate of Achievement After Completing Each Course
Overview
Oracle Database is currently regarded as the most popular database management system in the world and is widely used in application development, online transaction processing (OLTP), data warehousing, mixed (OLTP & DW) database workloads, and enterprise grid computing, allowing large size companies to store and work with massive amounts of data. Oracle Database offers several complex security features and tools, such as Transparent Data Encryption, Key Management, Database Security Assessment Tool, Database Firewall, MAC, auditing, and more, and database administrators and data security teams must be well-trained to administer these features effectively. Oracle Database security teams can face several security issues and vulnerabilities, including broken access control, encryption failures, misconfigurations, outdated components, identification and authentication failures, monitoring failures, and more. Oracle Database can be prone to several security attacks, including SQL Injection attacks, brute forcing, accessible backups, DoS attacks, packet sniffing, exposed databases, data leakage, and privilege escalation, while Oracle Database was also impacted by the Log4j vulnerability. Thus, it is crucial for database admins, database security admins, and system administrators, to correctly administer Oracle Database security features and deploy additional measures such as monitoring and isolation to prevent vulnerability attacks.
The course will start with a thorough introduction to Oracle Database 19c, followed by a look at Oracle Database 19c’s components, architecture, and operation. As you move along, you’ll gain an understanding of the common security vulnerabilities and attack vectors in Oracle Database 19c, and what are the fundamental requirements for Database Security. Next, you’ll learn how to perform privilege analysis in Oracle Database and how to use Oracle Database Security Assessment Tool (DBSAT) to manage security configuration, user entitlement, and sensitive data risks. The course will then illustrate how to deploy Oracle Database Firewall, which will be followed by an introduction to the Oracle Database Vault. The course will then demonstrate how to perform user and permissions management in Oracle Database and how to manage database roles. You’ll also explore how to use Oracle Label Security for data access control. Moving ahead, the course will guide you through the process of password management in Oracle Database, and how authentication and authorization are carried out in Oracle Databases. You’ll also explore how data encryption is carried out in Oracle Databases, and how application security is performed in Oracle Databases with RASADM. The course will then illustrate how to perform data masking and subnetting in Oracle Databases and how to audit and monitor database activity. You’ll also learn how to perform logging in an Oracle Database, how vulnerability management is carried out in Oracle Database, and how to defend Oracle Databases against SQL Injection. As you near the conclusion, you’ll also learn how to ensure regular updates and patch installation in your Oracle Database and how to secure the Oracle Database against the Log4J vulnerability. The course will end with a look at some of the best security practices and security errors to avoid.
By the end of this course, you’ll have a clear understanding of all the potential security issues in the Oracle Database, and you’ll be able to implement the measures needed to protect your Oracle Database environment.
What You Will Learn
Learn how to effectively secure your Oracle Database system against both internal and external threats
How to monitor and audit activities within the database to provide an audit should something go wrong
Data security techniques such as encryption and firewalls
How to analyze your own database’s security status and how to obtain recommendations on configuration changes
Hands-on to prevent non-authorized users from gaining access to your database using force or other code base techniques
Prerequisites
- This course will feature many hands-on labs and workshops therefore the minimum you require is: An Oracle Enterprise Edition database, version 19c or later where you are authorized to make configuration changes. We recommend strongly that you use only a test or sandpit environment as some changes may impact any running workloads. For total safety, you are advised to set up a new database for the sole purpose of completing this course.
Course Content
Chapter 1: An Introduction to Oracle Databases
4 Videos | 0 hrs 40 mins
Introduction to Oracle Databases Oracle Database Architecture Installing and Configuring Oracle Databases $7 Million Cybersecurity Scholarship by EC-Council
More Details
Chapter 2: The Common Security Pitfalls and How to Avoid Them
3 Videos | 0 hrs 34 mins
Introduction to Database Security Pitfalls Strategies for Avoiding Weak Passwords and User Privilege Issues Data Leakage Prevention Strategies Chapter 2 Quiz
More Details
Chapter 3: Using Database Security Assessment Tools
3 Videos | 0 hrs 32 mins
Introduction to Database Security Assessment Tools Oracle Database Security Assessment Tool (DBSAT) Oracle Audit Vault Chapter 3 Quiz
More Details
Chapter 4 Working with Oracle Database Firewall
3 Videos | 0 hrs 24 mins
Introduction to Oracle Database Firewall Setting Up Policies and Rules in Oracle Database Firewall Monitoring and Analyzing Firewall Activity Chapter 4 Quiz
More Details
Chapter 5: Using Oracle Database Vault to Control Privileged Access
3 Videos | 0 hrs 28 mins
Introduction to Oracle Database Vault Setting up Oracle Database Vault Managing Realms and Access Control Policies Chapter 5 Quiz
More Details
Chapter 6: Managing your users within Oracle
3 Videos | 0 hrs 29 mins
Introduction to Managing Users in Oracle Creating Users and Assigning Privileges User Authentication Methods Chapter 6 Quiz
More Details
Chapter 7: When to use Oracle Label Security
3 Videos | 0 hrs 32 mins
Introduction to Oracle Database Label Security Setting up Label Security Policies Managing Labels and Creating Security Profiles Chapter 7 Quiz
More Details
Chapter 8: Understanding Database Encryption
3 Videos | 0 hrs 34 mins
Introduction to Database Encryption Using Transparent Data Encryption (TDE) Data Redaction Chapter 8 Quiz
More Details
Chapter 9: Using Oracle Real Application Security (RASADM)
3 Videos | 0 hrs 27 mins
Introduction to Oracle Database Real Application Security Administration (RASADM) Creating and Managing Security Policies with RASADM Enforcing Security Policies with RASADM Chapter 9 Quiz
More Details
Chapter 10: Using Data Masking and Data Subsetting to Control Sensitive Data
3 Videos | 0 hrs 32 mins
Using Data Masking and Data Subsetting to Control Sensitive Data Creating and Managing Data Masks and Subsets Applying Data Masks and Subsets to Your Database Chapter 10 Quiz
More Details
Chapter 11: Avoid Getting a SQL Injection Attack
2 Videos | 0 hrs 13 mins
Introduction to SQL Injection Attacks Identifying and Preventing SQL Injection Attacks Chapter 11 Quiz
More Details
Chapter 12: Database Patching and Vulnerability Management
3 Videos | 0 hrs 36 mins
Introduction to Database Patching Best Practices Database Patching Oracle Vulnerability Management Chapter 12 Quiz
More Details
Chapter 13: Summary and Conclusion
1 Videos | 0 hrs 7 mins
Course Summary and Next Steps
More Details
Instructor

Kate Gawron
Upgrade to Pro+
Master New Skills with 700+ Courses
Advance Your Career with Learning Paths
Gain Practical Experience with 800+ Practice Labs
Tackle Real-World Challenges with CTFs
Achieve Recognition with Essential Certifications
A Shareable Certificate of Achievement After Completing Each Course
Looking to train your team?
Get reporting and analytics for your users and much more with our enterprise features
Learn moreReviews
5
3 reviews
Average Course Rating
5 stars
4 stars
3 stars
2 stars
1 stars
Related Courses
Short Course

ownCloud NAS - Secure and Storage for Home and Business
Cloud Security
Access your data from everywhere in the world using any device (desktop or mobile). Your own "Dropbox clone" service!
Short Course

Cloud Security Essentials (C|SE)
Cloud Security
Learn essential cloud security foundational concepts from the comprehensive training course. Boost your career with EC-Council’s C|SE program.
Short Course

Amazon Redshift Demystified
Cloud Security
Building a Resilient and Secure Data Warehouse using Amazon’s DWH As A Service
Short Course

Certified Cloud Security Professionals (CCSE)
Cloud Security
Learn Multi-Cloud Security Skills Go Beyond Cloud Computing with C|CSE