Oracle Cloud Security Data Protection and Encryption
Oracle Cloud Security Data Protection and Encryption, available at $19.99, has an average rating of 4.55, with 43 lectures, based on 80 reviews, and has 12195 subscribers.
You will learn about Learn how to identify the major risks and security threats, and review general best practices for properly protecting and "hardening" any production database This course is ideal for individuals who are Oracle Database Administrator and Oracle Developer It is particularly useful for Oracle Database Administrator and Oracle Developer.
Enroll now: Oracle Cloud Security Data Protection and Encryption
Summary
Title: Oracle Cloud Security Data Protection and Encryption
Price: $19.99
Average Rating: 4.55
Number of Lectures: 43
Number of Published Lectures: 43
Number of Curriculum Items: 43
Number of Published Curriculum Objects: 43
Original Price: $74.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn how to identify the major risks and security threats, and review general best practices for properly protecting and "hardening" any production database
Who Should Attend
- Oracle Database Administrator and Oracle Developer
Target Audiences
- Oracle Database Administrator and Oracle Developer
Database security is one of the hottest topics for Oracle DBAs, and one of the most important aspects of their role. With the increasing risks of cyberattacks, database hacks, and data leaks, knowing how to fully enable and leverage all of the Oracle 12c security features is essential. In this course covers this vitally important and in-demand skill.
Learn how to identify the major risks and security threats, and review general best practices for properly protecting and “hardening” any production database. Then, dive into hands-on demos that show how to set up user accounts, the connection between users and schemas, database object and system permissions, and roles in a multitenant environment, as well as encrypt data, audit user actions, and access to sensitive information. Plus, find out how to enable data-at-rest security via the Oracle Transparent Data Encryption and backup encryption options.
The Following topics are covered:
- Core concepts of Oracle database security
- Potential threats to Oracle database security
- Authentication and authorization
- Auditing access
- Data encryption
- Users and permissions
- Database roles
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Chapter 2: Database Security Fundamentals
Lecture 1: Why database security is important
Lecture 2: Authentication an database users
Lecture 3: Authorization and permissions
Chapter 3: Advanced Database Security Concepts
Lecture 1: Database auditing
Lecture 2: Database encryption
Lecture 3: Roles of DBAs in Oracle security
Chapter 4: Download and Set Up the Course VM
Lecture 1: Download the course VM
Lecture 2: How to Enable archive mode
Chapter 5: Users and Permissions
Lecture 1: Users, schemas, and the SYSDBA
Lecture 2: Create new database users
Lecture 3: Grant and evoke system privileges
Lecture 4: Grant database-wide system privileges
Lecture 5: Tablespace quotas
Lecture 6: Object permissions
Lecture 7: Password management policies
Lecture 8: The WITH GRANT and WITH ADMIN options
Lecture 9: Enforce password complexity
Lecture 10: Viewing users, permissions, and polices
Lecture 11: Deleting a database user
Lecture 12: Local vs. common user concepts
Lecture 13: Creating local users
Lecture 14: Creating common users
Chapter 6: Database Roles
Lecture 1: Introduction to database roles
Lecture 2: Creating, assigning, and dropping roles
Lecture 3: Viewing existing roles and role grants
Lecture 4: Roles with ADMIN OPTION
Chapter 7: Auditing Access to Data
Lecture 1: Configure audit parameters
Lecture 2: Creating unified audit policies
Lecture 3: Testing audit polices
Lecture 4: View the audit trail
Lecture 5: Using standard auditing
Lecture 6: Fine-grained auditing
Lecture 7: Manage the audit trail
Chapter 8: Data Encryption
Lecture 1: Configure the keystore
Lecture 2: Create encryption key
Lecture 3: Encryping data in tables
Lecture 4: Encrypting tablespaces
Lecture 5: Encrypting Data Pump backups
Lecture 6: Encrypting RMAN Backups
Lecture 7: Restore encrypted RMAN Backup
Lecture 8: Open the wallet after DB restart
Chapter 9: Conclusion
Lecture 1: Final Words
Instructors
-
Zulqarnain Hayat
Senior Database Specialist and Team Lead Middleware,AWS
Rating Distribution
- 1 stars: 2 votes
- 2 stars: 7 votes
- 3 stars: 12 votes
- 4 stars: 9 votes
- 5 stars: 50 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple