0345 4506120

Introduction to Oracle Database Security

This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Develop a deep understanding of the security risks and Oracle solutions provided to help address those risks.

Learn To:

  •   Describe and determine database security requirements.
  •   Choose Oracle security solutions to meet security requirements.
  •   Implement basic database security.
  •   Configure network security.
  •   Discover basic security configuration issues.

Benefits to You

By participating in hands-on practices and available demonstrations, you'll know how to use features of Oracle Database 12c to secure the databases in your own organization. You'll begin by implementing basic database and network security and build on this knowledge throughout the course.

We don't currently have any courses listed for Introduction to Oracle Database Security, would you like to view all courses for Oracle?

Learning Objectives

Describe and determine database security requirements

  •   Understand Oracle security solutions to help meet security requirements
  •   Implement basic database security
  •   Configure network security
  •   Discover basic security configuration issues


Required Prerequisites:

  •   Good knowledge of Oracle Database

Suggested Prerequisites:

  •   Create and manage users, roles, and privileges


  •   Security Administrators
  •   Auditor
  •   Database Administrators
  •   Network Administrator
  •   System Analysts
  •   ##Support Engineer

Course Content


  •   Course Objectives
  •   Course Schedule
  •   Detective Security Controls
  • Preventive Security Controls
  •   Your Learning Aids
  •   Basic Workshop Architecture

Understanding Security Requirements

  •   Fundamental Data Security Requirements
  •   Security Risks
  •   Techniques to Enforce Security

Choosing Security Solutions

  • Database Access Control: Authentication
  •   Protecting Against Database Bypass with Encryption
  •   Protecting Sensitive Data
  •   Protecting against Application Bypass
  •   Detecting Threats
  •   Compliance

Implementing Basic Database Security

  •   Database Security Checklist
  •   Reducing Administrative Effort
  •   Principle of Least Privilege
  •   Objects Protection

Configuring Network Security

  •   Network Access Control
  •   Listener Security
  •   Listener Usage Control
  •   Manage fine-grained access to external network services

Discovering Basic Configuration Issues

  •   Accessing Enterprise Manager Security Reports
  •   Using Various Security Reports

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include