back to Course Categories | back | print
Oracle10g Security Best Practices          

Duration: 3 days

This class will teach sales representatives, 3rd party vendors, system architects, DBAs and developers the key features and issues of securing platforms running Oracle software. Sarbanes-Oxley, Cobit and Internet environments are requiring improved security for Oracle database server environments. The first day will focus on Oracle products, architecture, software solutions and strategic directions in an Internet environment. The second day will focus on security inside of the Oracle database server. The third day will focus on additional Oracle security products, Oracle networking and securing the entire Oracle platform.


    Understanding the Oracle environment
  • The main components of an Oracle Server
  • Oracle concepts and terminology
  • Oracle memory and programs
  • Components of an Oracle database
  • Oracle Enterprise Manager
  • Oracle Grid
  • Oracle tablespaces and datafiles
  • Overview of Oracle products and tools
  • Oracle10g/9i database server
  • Oracle10g/9i application server
  • Oracle JDeveloper 10g
  • Oracle Developer (Forms/Reports)
    Security in an Internet Environment
  • Data Security Requirements
  • Data Protection
  • Authentication and Authorization
  • Data Theft, Corruption, and Disruption
  • Security and the Internet
  • Data and Service Security
    Oracle Security Fundamentals
  • User Management
  • System privileges
  • Object privileges
  • Role based security
  • Enabling and disabling roles
  • Secure application roles
  • Implementing Password Management
  • Protect the Data Dictionary
  • Managing Privileges to PUBLIC
  • Managing Directory Access
  • Managing Administrative Privileges
  • Controlling Remote Database Authentication
  • Securing the HTTP Server
  • Summary of good database security practices
    Fine Grain Access Control
  • Row level security with FGAC
  • Virtual Private Databases
  • Implementing Row Level Security
  • Security Policies
  • The Oracle Policy Manager
  • Group Policies
  • Oracle Policy Manager
    Fine Grained Auditing
  • Row level security with FGAC
  • Virtual Private Databases
  • Implementing Row Level Security
  • Security Policies
  • The Oracle Policy Manager
  • Group Policies
  • Oracle Policy Manager
  • Using Fine-Grained Auditing
  • Fine Grained Auditing (FGA)
  • FGA versus Database Auditing
  • The DBMS_FGA Package
  • Defining Audit Event Handlers
  • Managing FGA Policies
  • Audit Events
    Application Context
  • Understanding Application Context
  • Application Context Data Sources
  • Global access
  • Working with PL/SQL Procedures and Packages
  • Implementing Local Context
    Encrypting Data
  • Encrypting data
  • Managing encryption keys
  • Encryption options
  • The Oracle Policy Manager
  • Working with DESEncrypt and DESDecrypt
  • Working with DES3GetKey and DES3Encrypt
  • Working with MD5
    Security Solutions
  • Encryption and Decryption
  • Public Key Infrastructure (PKI)
  • Firewalls
  • Oracle Real Application Clusters
  • Distributed Computing Environment (DCE)
  • Wallet Password Management
  • Enterprise User Security
  • Oracle Label Security and Internet Directory
    Putting together Security Policies
  • Implementing Your Security Policy
  • Defining Security Requirements
  • Security Levels
  • Security Requirements
  • Developing Security Procedures and Security
  • Checklists
  • Implementing Security Policies
    Oracle Network Security
  • Securing the Client
  • Client Certificates
  • Firewall fundamentals
  • Encrypt Network Traffic
  • Configure VI Protocol Address and TCP/IP for SSL
  • Use Network Log Files to Monitor Connections
  • Listener security
  • The Listener Using TCP/IP with SSL
    Connection Manager
  • Firewalls
  • Network Architecture Regions
  • Use a Firewall to Restrict Database Access
  • Stateful Exterior Firewall
  • Send Outgoing Messages through DMZ Proxies
  • Oracle Connection Manager Control Utility
  • Starting and Shutting Down the Oracle Connection Manager
  • Monitor Connection Events Using the CMAN Log File
  • Analyzing Oracle Connection Manager Log Files
    Using Middle-Tier Authentication
  • Security in N-tier environments
  • Proxy Authentication
  • Real User ID: Database, Enterprise, and Application Users
  • Creating Proxy Authentication for Database and Enterprise Users
  • Revoking Proxy Authentication
  • Auditing Actions Taken on Behalf of the Real User
  • Limiting the Privilege of the Middle-Tier with Database Users
    Securing SQL*Plus and iSQL*Plus
  • Limiting Commands in SQL*Plus
  • Commands That Can Be Disabling Commands
  • iSQL*Plus Security
  • Enabling DBA Access
  • Enabling Server Authentication for Users
  • Enabling Restricted Database Access
  • Securing the Oracle Platform
    Security with different platforms
  • Host security
  • Networking
  • Good system security practices


  • Attendees must have a fundamental understanding of computers, operating systems and computer environments.


Trubix Inc. P.O. Box 2235 Littleton, CO 80161 | 1.866.4-TRUBIX • 303.730.6800

Training Service | Consulting / Mentoring | Public Schedule | Course Listings | Tru iLearning | About Us | Contact Us
Oracle DBA Classes | Oracle Dev Classes | Oracle App Server Classes | Linux / Unix Classes
SQL Server / .NET / Tools / DB2 Classes / Public Classes


all content property © 2006, 2007Trubix Inc.| site design by Art Z design