Practical Oracle Database Security
Practical Oracle Database Security
Intermediate
7 Hrs
Strengthen the security of your Oracle Database environments with in-built and external security measures.
Strengthen the security of your Oracle Database environments with in-built and external security measures.
Overview
Oracle Database is currently regarded as the most popular database management system in the world and is widely used in application development, online transaction processing (OLTP), data warehousing, mixed (OLTP & DW) database workloads, and enterprise grid computing, allowing large size companies to store and work with massive amounts of data. Oracle Database offers several complex security features and tools, such as Transparent Data Encryption, Key Management, Database Security Assessment Tool, Database Firewall, MAC, auditing, and more, and database administrators and data security teams must be well-trained to administer these features effectively. Oracle Database security teams can face several security issues and vulnerabilities, including broken access control, encryption failures, misconfigurations, outdated components, identification and authentication failures, monitoring failures, and more. Oracle Database can be prone to several security attacks, including SQL Injection attacks, brute forcing, accessible backups, DoS attacks, packet sniffing, exposed databases, data leakage, and privilege escalation, while Oracle Database was also impacted by the Log4j vulnerability. Thus, it is crucial for database admins, database security admins, and system administrators, to correctly administer Oracle Database security features and deploy additional measures such as monitoring and isolation to prevent vulnerability attacks.
The course will start with a thorough introduction to Oracle Database 19c, followed by a look at Oracle Database 19cโs components, architecture, and operation. As you move along, youโll gain an understanding of the common security vulnerabilities and attack vectors in Oracle Database 19c, and what are the fundamental requirements for Database Security. Next, youโll learn how to perform privilege analysis in Oracle Database and how to use Oracle Database Security Assessment Tool (DBSAT) to manage security configuration, user entitlement, and sensitive data risks. The course will then illustrate how to deploy Oracle Database Firewall, which will be followed by an introduction to the Oracle Database Vault. The course will then demonstrate how to perform user and permissions management in Oracle Database and how to manage database roles. Youโll also explore how to use Oracle Label Security for data access control. Moving ahead, the course will guide you through the process of password management in Oracle Database, and how authentication and authorization are carried out in Oracle Databases. Youโll also explore how data encryption is carried out in Oracle Databases, and how application security is performed in Oracle Databases with RASADM. The course will then illustrate how to perform data masking and subnetting in Oracle Databases and how to audit and monitor database activity. Youโll also learn how to perform logging in an Oracle Database, how vulnerability management is carried out in Oracle Database, and how to defend Oracle Databases against SQL Injection. As you near the conclusion, youโll also learn how to ensure regular updates and patch installation in your Oracle Database and how to secure the Oracle Database against the Log4J vulnerability. The course will end with a look at some of the best security practices and security errors to avoid.
By the end of this course, youโll have a clear understanding of all the potential security issues in the Oracle Database, and youโll be able to implement the measures needed to protect your Oracle Database environment.
What You Will Learn
- Learn how to effectively secure your Oracle Database system against both internal and external threats
- How to monitor and audit activities within the database to provide an audit should something go wrong
- Data security techniques such as encryption and firewalls
- How to analyze your own databaseโs security status and how to obtain recommendations on configuration changes
- Hands-on to prevent non-authorized users from gaining access to your database using force or other code base techniques
Prerequisites
- This course will feature many hands-on labs and workshops therefore the minimum you require is: An Oracle Enterprise Edition database, version 19c or later where you are authorized to make configuration changes. We recommend strongly that you use only a test or sandpit environment as some changes may impact any running workloads. For total safety, you are advised to set up a new database for the sole purpose of completing this course.
Content
Chapter 1: An Introduction to Oracle Databases
4 Videos
Introduction to Oracle Databases Oracle Database Architecture Installing and Configuring Oracle Databases $7 Million Cybersecurity Scholarship by EC-Council
Preview
Chapter 2: The Common Security Pitfalls and How to Avoid Them
3 Videos
Introduction to Database Security Pitfalls Strategies for Avoiding Weak Passwords and User Privilege Issues Data Leakage Prevention Strategies Chapter 2 Quiz
Preview
Chapter 3: Using Database Security Assessment Tools
3 Videos
Introduction to Database Security Assessment Tools Oracle Database Security Assessment Tool (DBSAT) Oracle Audit Vault Chapter 3 Quiz
Preview
Chapter 4 Working with Oracle Database Firewall
3 Videos
Introduction to Oracle Database Firewall Setting Up Policies and Rules in Oracle Database Firewall Monitoring and Analyzing Firewall Activity Chapter 4 Quiz
Preview
Chapter 5: Using Oracle Database Vault to Control Privileged Access
3 Videos
Introduction to Oracle Database Vault Setting up Oracle Database Vault Managing Realms and Access Control Policies Chapter 5 Quiz
Preview
Chapter 6: Managing your users within Oracle
3 Videos
Introduction to Managing Users in Oracle Creating Users and Assigning Privileges User Authentication Methods Chapter 6 Quiz
Preview
Chapter 7: When to use Oracle Label Security
3 Videos
Introduction to Oracle Database Label Security Setting up Label Security Policies Managing Labels and Creating Security Profiles Chapter 7 Quiz
Preview
Chapter 8: Understanding Database Encryption
3 Videos
Introduction to Database Encryption Using Transparent Data Encryption (TDE) Data Redaction Chapter 8 Quiz
Preview
Chapter 9: Using Oracle Real Application Security (RASADM)
3 Videos
Introduction to Oracle Database Real Application Security Administration (RASADM) Creating and Managing Security Policies with RASADM Enforcing Security Policies with RASADM Chapter 9 Quiz
Preview
Chapter 10: Using Data Masking and Data Subsetting to Control Sensitive Data
3 Videos
Using Data Masking and Data Subsetting to Control Sensitive Data Creating and Managing Data Masks and Subsets Applying Data Masks and Subsets to Your Database Chapter 10 Quiz
Preview
Chapter 11: Avoid Getting a SQL Injection Attack
2 Videos
Introduction to SQL Injection Attacks Identifying and Preventing SQL Injection Attacks Chapter 11 Quiz
Preview
Chapter 12: Database Patching and Vulnerability Management
3 Videos
Introduction to Database Patching Best Practices Database Patching Oracle Vulnerability Management Chapter 12 Quiz
Preview
Chapter 13: Summary and Conclusion
1 Videos
Course Summary and Next Steps
Preview
Instructor
Kate Gawron
Get access to only this course
$49.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise ยปReviews
(3 reviews)
5
Average Course Rating
Related Courses
53 enrollments
Course
Jumpstart Terraform 0.12 on Azure
$49.99