TRAINING ONLINE ORACLE DATABASE 12C SECURITY

TRAINING WEBINAR PENGENALAN ORACLE DATABASE 12C SECURITY

TRAINING KEAMANAN BASIS DATA ORACLE UNTUK PRAKERJA

pelatihan Oracle Database 12C Security online

    This  Oracle  Database  12c: Security training teaches you how you can
    use  Oracle  Database  features  to  meet  the  security,  privacy and
    compliance requirements of your organization. You’ll get the chance to
    interact   with   expert   Oracle  University  instructors  through  a
    combination  of  instruction and hands-on exercises that reinforce new
    concepts. pelatihan pengenalan Oracle Database 12C Security online

 
OBJECTIVES pelatihan keamanan basis data oracle online

   Setelah mengikuti pelatihan ini peserta diharapkan mampu untuk :
     1. Securing the Database Installation and Configuration
     2. Managing user privileges
     3. Encrypting data with oracle transparent data encryption
     4. Controlling access with oracle database vault
     5. Restricting access with oracle virtual private database
     6. Limiting Access to sensitive data using oracle data redaction
     7. Enforcing row-level security with oracle label security
     8. Auditing database activivty

SYLLABUS pelatihan prinsip keamanan basis data online

    1. Introduction to Oracle Database Security
           + About This Guide
           + Before Using This Guide
           + is Guide Is and Is Not
           + Common Database Security Tasks
           + Tools for Securing Your Database
           + Securing Your Database: A Roadmap
     2. Securing the Database Installation and Configuration
           + About Securing the Database Installation and Configuration
           + Securing Access to the Oracle Database Installation
           + Default Security Settings
           + Security for the Oracle Data Dictionary
           + Initialization   Parameters   Used   for   Installation   and
             Configuration Security
           + Modifying the Value of an Initialization Parameter
           + Security for the Network
           + About Securing the Network
           + Protecting Data on the Network by Using Network Encryption
           + Initialization Parameters Used for Network Security
           + Securing User Accounts
           + About Securing Oracle Database User Accounts
           + Predefined User Accounts Provided by Oracle Database
           + Expiring and Locking Database Accounts
           + Requirements for Creating Passwords
           + Finding and Changing Default Passwords
           + Parameters Used to Secure User Accounts
     3. Managing User Privileges
           + About Privilege Management
           + When to Grant Privileges to Users
           + When to Grant Roles to Users
           + Controlling  Access  to  Applications with Secure Application
             Roles
           + About Secure Application Roles
           + Tutorial: Creating a Secure Application Role
           + Initialization Parameters Used for Privilege Security
     4. Encrypting Data with Oracle Transparent Data Encryption
           + About Encrypting Sensitive Data
           + When Should You Encrypt Data?
           + How Transparent Data Encryption Works
           + Configuring Data to Use Transparent Data Encryption
           + Step 1: Configure the Keystore Location
           + Step 2: Check the COMPATIBLE Initialization Parameter Setting
           + Step 3: Create the Software Password-Based Keystore
           + Step 4: Open (or Close) the Keystore
           + Step 5: Create the Master Encryption Key
           + Step 6: Encrypt Data
           + Checking Existing Encrypted Data
           + Finding the Type of Keystore That Was Created
           + Finding the Keystore Location
           + Checking Whether a Keystore Is Open or Closed
           + Checking Encrypted Columns of an Individual Table
           + Checking  All Encrypted Table Columns in the Current Database
             Instance
           + Data  Dictionary  Views for Checking Encrypted Tablespaces in
             the Current Database Instance
     5. Controlling Access with Oracle Database Vault
           + About Oracle Database Vault
           + Tutorial: Controlling Administrator Access to a User Schema
                o Step 1: Enable Oracle Database Vault
                o Step  2:  Grant the SELECT Privilege on the OE.CUSTOMERS
                  Table to User SCOTT
                o Step  3: Select from the OE.CUSTOMERS Table as Users SYS
                  and SCOTT
                o Step 4: Create a Realm to Protect the OE.CUSTOMERS Table
                o Step 5: Test the OE Protections Realm
                o Step  6:  Optionally,  Remove  the  Components  for This
                  Tutorial
     6. Restricting Access with Oracle Virtual Private Database
           + About Oracle Virtual Private Database
           + Tutorial: Limiting Access to Data Based on the Querying User
           + About Limiting Access to Data Based on the Querying User
                o Step 1: Create User Accounts for This Tutorial
                o Step  2: If Necessary, Create the Security Administrator
                  Account
                o Step 3: Update the Security Administrator Account
                o Step 4: Create the F_POLICY_ORDERS Policy Function
                o Step  5: Create the ACCESSCONTROL_ORDERS Virtual Private
                  Database Policy
                o Step  6:  Test  the ACCESSCONTROL_ORDERS Virtual Private
                  Database Policy
                o Step  7:  Optionally,  Remove  the  Components  for This
                  Tutorial
     7. Limiting Access to Sensitive Data Using Oracle Data Redaction
           + About Oracle Data Redaction
           + Tutorial: Redacting Data for a Select Group of Users
           + About Redacting Data for a Select Group of Users
                o Step   1:  Create  User  Accounts  and  Grant  Them  the
                  Necessary Privileges
                o Step   2:  Create  and  Populate  the  SALES_OPPS  Sales
                  Opportunities Table
                o Step  3: Create the SALES_OPPS_POL Oracle Data Redaction
                  Policy
                o Step  4:  Test  the SALES_OPPS_POL Oracle Data Redaction
                  Policy
                o Step  5:  Optionally,  Remove  the  Components  for This
                  Tutorial
     8. Enforcing Row-Level Security with Oracle Label Security
           + About Oracle Label Security
           + Differences  Between  Virtual  Private Database, Oracle Label
             Security, and Data Redaction
           + Guidelines for Planning an Oracle Label Security Policy
           + Tutorial:  Creating  Levels  of Access to Table Data Based on
             the User
           + About  Creating  Levels  of Access to Table Data Based on the
             User
                o Step 1: Enable Oracle Label Security
                o Step 2: Enable the LBACSYS Account
                o Step  3:  Create  a  Role and Three Users for the Oracle
                  Label Security Tutorial
                o Step   4:   Create  the  ACCESS_LOCATIONS  Oracle  Label
                  Security Policy
                o Step   5:   Define   the  ACCESS_LOCATIONS  Policy-Level
                  Components
                o Step 6: Create the ACCESS_LOCATIONS Policy Data Labels
                o Step   7:   Create   the  ACCESS_LOCATIONS  Policy  User
                  Authorizations
                o Step   8:  Apply  the  ACCESS_LOCATIONS  Policy  to  the
                  HR.LOCATIONS Table
                o Step   9:   Add   the  ACCESS_LOCATIONS  Labels  to  the
                  HR.LOCATIONS Data
                o Step 10: Test the ACCESS_LOCATIONS Policy
                o Step  11:  Optionally,  Remove  the  Components for This
                  Tutorial
     9. Auditing Database Activity
           + About Auditing
           + Why Is Auditing Used?
           + Tutorial: Creating a Unified Audit Policy
                o Step 1: If Necessary, Enable Unified Auditing
                o Step 2: Grant the SEC_ADMIN User the AUDIT_ADMIN Role
                o Step 3: Create and Enable a Unified Audit Policy
                o Step 4: Test the Unified Audit Policy
                o Step  5:  Optionally,  Remove  the  Components  for This
                  Tutorial
                o Step   6:  Optionally,  Remove  the  SEC_ADMIN  Security
                  Administrator Account

AUDIENCE TARGET (Intermediate and advanced Level)

     * IT/ Technical Staff, IT Manager
      * Software  Developer  /  Programmer,  Software  Consultant,  System
        Analyst,   System   Administrator,   Database  Administrator.,  IT
        Support, IT administration
      * High School Graduate

TRAINING METHOD

     * 25% Theory
      * 75% Practices  (Case study).
      * Dynamic and interactive training presentation

Jadwal Pelatihan sinaran-training.com tahun 2020 :

15-16 Januari 2020

12-13 Februari 2020

19-29 Maret 2020

22-23 April 2020

24-25 Juni 2020

21-22 Juli 2020

27-28 Agustus 2020

16-17 September 2020

20-21 Oktober 2020

18-19 November 2020

23-24 Desember 2020

Jadwal tersebut dapat disesuaikan dengan kebutuhan calon peserta

Lokasi Pelatihan Tahun 2020 :

Yogyakarta, Hotel Dafam Seturan(7.300.000 IDR / participant)

Jakarta, Hotel Amaris Tendean (7.900.000 IDR / participant)

Bandung, Hotel Golden Flower (7.800.000 IDR / participant)

Bali, Hotel Ibis Kuta (8.500.000 IDR / participant)

Lombok, Hotel Jayakarta (8.750.000 IDR / participant)

Catatan :

  • Waktu pelatihan Dua+1* hari dengan Biaya tersedia untuk Perorangan, Group, dan Inhouse Training, belum termasuk akomodasi/penginapan.
  • Untuk biaya dan jadwal training harap menghubungi marketing kembali

Investasi training:

Investasi pelatihan selama dua hari tersebut menyesuaikan dengan jumlah peserta (on call). *Please feel free to contact us.

Apabila perusahaan membutuhkan paket in house training, anggaran investasi pelatihan dapat menyesuaikan dengan anggaran perusahaan.

Fasilitas training:

Free Penjemputan dari bandara ke hotel*.

Modul / Handout.

Flashdisk*.

Certificate of attendance.

FREE Bag or bagpacker.

Leave a Comment