Oracle Database 12C Security

Oracle Database 12C Security

Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta | 25 – 26 Maret 2019 | Rp 5.225.000
Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta | 24 – 25 Mei 2019 | Rp 5.225.000
Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta | 24 – 25 Juli 2019 | Rp 5.225.000
Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta | 23 – 24 September 2019 | Rp 5.225.000
Amaris Hotel/ Neo Hotel/ Santika Hotel, Jakarta | 20 – 21 November 2019 | Rp 5.225.000

 

 

This Oracle Database 12c: Security training teaches you how you can use Oracle Database features to meet the security, privacy and compliance requirements of your organization. You’ll get the chance to interact with expert Oracle University instructors through a combination of instruction and hands-on exercises that reinforce new concepts.

 

Oracle Database 12C Security Training Objectives

Setelah mengikuti pelatihan ini peserta diharapkan mampu untuk :

  1. Securing the Database Installation and Configuration
  2. Managing user privileges
  3. Encrypting data with oracle transparent data encryption
  4. Controlling access with oracle database vault
  5. Restricting access with oracle virtual private database
  6. Limiting Access to sensitive data using oracle data redaction
  7. Enforcing row-level security with oracle label security
  8. Auditing database activivty

 

Oracle Database 12C Security Training Syllabus

  1. Introduction to Oracle Database Security
    • About This Guide
    • Before Using This Guide
    • is Guide Is and Is Not
    • Common Database Security Tasks
    • Tools for Securing Your Database
    • Securing Your Database: A Roadmap
  2. Securing the Database Installation and Configuration
    • About Securing the Database Installation and Configuration
    • Securing Access to the Oracle Database Installation
    • Default Security Settings
    • Security for the Oracle Data Dictionary
    • Initialization Parameters Used for Installation and Configuration Security
    • Modifying the Value of an Initialization Parameter
    • Security for the Network
    • About Securing the Network
    • Protecting Data on the Network by Using Network Encryption
    • Initialization Parameters Used for Network Security
    • Securing User Accounts
    • About Securing Oracle Database User Accounts
    • Predefined User Accounts Provided by Oracle Database
    • Expiring and Locking Database Accounts
    • Requirements for Creating Passwords
    • Finding and Changing Default Passwords
    • Parameters Used to Secure User Accounts
  3. Managing User Privileges
    • About Privilege Management
    • When to Grant Privileges to Users
    • When to Grant Roles to Users
    • Controlling Access to Applications with Secure Application Roles
    • About Secure Application Roles
    • Tutorial: Creating a Secure Application Role
    • Initialization Parameters Used for Privilege Security
  4. Encrypting Data with Oracle Transparent Data Encryption
    • About Encrypting Sensitive Data
    • When Should You Encrypt Data?
    • How Transparent Data Encryption Works
    • Configuring Data to Use Transparent Data Encryption
    • Step 1: Configure the Keystore Location
    • Step 2: Check the COMPATIBLE Initialization Parameter Setting
    • Step 3: Create the Software Password-Based Keystore
    • Step 4: Open (or Close) the Keystore
    • Step 5: Create the Master Encryption Key
    • Step 6: Encrypt Data
    • Checking Existing Encrypted Data
    • Finding the Type of Keystore That Was Created
    • Finding the Keystore Location
    • Checking Whether a Keystore Is Open or Closed
    • Checking Encrypted Columns of an Individual Table
    • Checking All Encrypted Table Columns in the Current Database Instance
    • Data Dictionary Views for Checking Encrypted Tablespaces in the Current Database Instance
  5. Controlling Access with Oracle Database Vault
    • About Oracle Database Vault
    • Tutorial: Controlling Administrator Access to a User Schema
      • Step 1: Enable Oracle Database Vault
      • Step 2: Grant the SELECT Privilege on the OE.CUSTOMERS Table to User SCOTT
      • Step 3: Select from the OE.CUSTOMERS Table as Users SYS and SCOTT
      • Step 4: Create a Realm to Protect the OE.CUSTOMERS Table
      • Step 5: Test the OE Protections Realm
      • Step 6: Optionally, Remove the Components for This Tutorial
  6. Restricting Access with Oracle Virtual Private Database
    • About Oracle Virtual Private Database
    • Tutorial: Limiting Access to Data Based on the Querying User
    • About Limiting Access to Data Based on the Querying User
      • Step 1: Create User Accounts for This Tutorial
      • Step 2: If Necessary, Create the Security Administrator Account
      • Step 3: Update the Security Administrator Account
      • Step 4: Create the F_POLICY_ORDERS Policy Function
      • Step 5: Create the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 6: Test the ACCESSCONTROL_ORDERS Virtual Private Database Policy
      • Step 7: Optionally, Remove the Components for This Tutorial
  7. Limiting Access to Sensitive Data Using Oracle Data Redaction
    • About Oracle Data Redaction
    • Tutorial: Redacting Data for a Select Group of Users
    • About Redacting Data for a Select Group of Users
      • Step 1: Create User Accounts and Grant Them the Necessary Privileges
      • Step 2: Create and Populate the SALES_OPPS Sales Opportunities Table
      • Step 3: Create the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 4: Test the SALES_OPPS_POL Oracle Data Redaction Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
  8. Enforcing Row-Level Security with Oracle Label Security
    • About Oracle Label Security
    • Differences Between Virtual Private Database, Oracle Label Security, and Data Redaction
    • Guidelines for Planning an Oracle Label Security Policy
    • Tutorial: Creating Levels of Access to Table Data Based on the User
    • About Creating Levels of Access to Table Data Based on the User
      • Step 1: Enable Oracle Label Security
      • Step 2: Enable the LBACSYS Account
      • Step 3: Create a Role and Three Users for the Oracle Label Security Tutorial
      • Step 4: Create the ACCESS_LOCATIONS Oracle Label Security Policy
      • Step 5: Define the ACCESS_LOCATIONS Policy-Level Components
      • Step 6: Create the ACCESS_LOCATIONS Policy Data Labels
      • Step 7: Create the ACCESS_LOCATIONS Policy User Authorizations
      • Step 8: Apply the ACCESS_LOCATIONS Policy to the HR.LOCATIONS Table
      • Step 9: Add the ACCESS_LOCATIONS Labels to the HR.LOCATIONS Data
      • Step 10: Test the ACCESS_LOCATIONS Policy
      • Step 11: Optionally, Remove the Components for This Tutorial
  9. Auditing Database Activity
    • About Auditing
    • Why Is Auditing Used?
    • Tutorial: Creating a Unified Audit Policy
      • Step 1: If Necessary, Enable Unified Auditing
      • Step 2: Grant the SEC_ADMIN User the AUDIT_ADMIN Role
      • Step 3: Create and Enable a Unified Audit Policy
      • Step 4: Test the Unified Audit Policy
      • Step 5: Optionally, Remove the Components for This Tutorial
      • Step 6: Optionally, Remove the SEC_ADMIN Security Administrator Account

 

Oracle Database 12C Security Training Audience Target (Intermediate and advanced Level)

  • IT/ Technical Staff, IT Manager
  • Software Developer / Programmer, Software Consultant,  System Analyst, System Administrator, Database Administrator., IT Support, IT administration
  • High School Graduate

 

Oracle Database 12C Security Training Method

  • 25% Theory
  • 75% Practices  (Case study).
  • Dynamic and interactive training presentation

 

Oracle Database 12C Security Training Leader

Agus Sulaiman, S. Kom, MM

Praktisi trainer yang mempunyai pengalaman lebih dari 10 tahun menjadi lecture/ instructor / trainer/ Software developer di beberapa lembaga pelatihan swasta, instansi pemerintah / swasta  di Jakarta, mulai tahun 2003 – 2014, antara lain  di Universitas Multimedia Nusantara, Universitas Bina Nusantara, Universitas Bunda Mulia, Institut Bisnis dan Informatika Indonesia, Binus Center, Smart Learning, Xsis Mitra Utama, Cyber Campus, SKA.

Pernah menjabat sebagai Head of IT Software developer department di perusahaan swasta dan perusahaan jasa konsultan. Sekarang beliau aktif sebagai pengajar di beberapa kampus, memberikan pelatihan      di perusahaan provider training and consulting dan bekerja dalam dunia IT Software developer ERP (Enterprise Resource planning) system dengan produk yang dihasilkan dengan nama ISA (Integrated System Apllication).

Selain tema pelatihan tersebut di atas, beliau juga memberikan pelatihan IT sebagai berikut :

  • Introduction to SQL on Oracle 10g /11g Database
  • Programming With PL/SQL on Oracle 10g/11g Database
  • Build Internet Applications with Oracle 10g Forms
  • Build Reports with Oracle 10g Reports
  • Introduction to Database with Microsoft Access
  • Web Programming with ASP.Net
  • Programming N-Tier With ASP.Net
  • Database Programming T-SQL with Microsoft SQL Server
  • Introduction to Microsoft Access Programming
  • Step by step menjadi programmer handal dengan tools .Net Developer