25,000+ Courses Nationwide
0345 4506120

Oracle 12c Database Security

Oracle 12c Database Security training course students will learn The Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and other pan-national schemas require extensive database security control to protect enterprise data.

Who Should Attend?

DBA Administrators 

System Administrators 

This Oracle 12c Database Security course introduces students to the range of Oracle 12C database control features and products designed to fully support and enable enterprise wide database security.

Students will learn how to manage access control, create Virtual Private Databases, configure Audit Vaults and manage Oracle Database Firewall v 12.1.1 and the features to fully control and deploy enterprise wide security policies that will fulfill the regulatory requirements.

Select specific date to see price, venue and full details.


Oracle SQL and PL/SQL familiarity

Course Content



  • Course Objectives
  • Course Schedule and Appendices

Understanding Security Requirements

  • Fundamental Data Security Requirements
  • Security Risks
  • Exploits
  • Techniques to Enforce Security

Choosing Security Solutions

  • Network Access Control
  • Database Access Control
  • Data Access Control
  • Data Confidentiality
  • Data Integrity
  • Audit
  • Compliance

Implementing Basic Database Security

  • Database Security Checklist
  • Reducing Administrative Effort
  • Principle of Least Privilege
  • Objects Protection

Securing Data on the Network

  • Network Access Control
  • Listener Security
  • Listener Usage Control

Using Basic and Strong User Authentication

  • Basic Authentication
  • Strong Authentication
  • Database Link Passwords Protection

Configuring Global User Authentication

  • About Enterprise User Management (EUS)
  • EUS and Oracle Internet Directory Integration

Using Proxy Authentication

  • Security Challenges of Three-Tier Computing
  • Proxy Authentication Solutions


Using Privileges and Roles

  • Separation of Duties
  • Roles Management
  • Managing Security for Definer's Rights and Invoker's Rights
  • Managing RMAN Virtual Private Catalogs

Using Privilege Analysis

  • Privilege Analysis Flow
  • Privilege Analysis Implementation

Using Application Contexts

  • Description of Application Context
  • Application Context Implementation

Implementing Virtual Private Database

  • Fine-Grained Access Control and VPD
  • FGAC Policies Management
  • VPD Policies Management

Implementing Oracle Label Security

  • Access Control Overview
  • Oracle Label Security Registration
  • Oracle Label Security Policies Management

Redacting Data

  • Redacting Data
  • Masking Policies Implementation


Using Oracle Data Masking

  • Overview
  • Data Masking Definition Implementation
  • Data Masking Process

Using Transparent Sensitive Data Protection

  • TDPS Implementation

Encryption Concepts and Solutions

  • Concepts
  • Solutions
  • Oracle Solutions

Encrypting with DBMS_CRYPTO Package

  • Usage

Using Transparent Data Encryption

  • Overview
  • The Master Keys and the Keystore
  • Hardware Keystore
  • Encryption


Introduction to Oracle Audit Vault

  • Responding to Compliance Regulations
  • Problems with In-House Auditing Implementations
  • Oracle Audit Vault Features
  • Oracle Audit Vault Architecture and Components
  • Overview of Oracle Audit Vault Users
  • Overview of Oracle Database Vault
  • Overview of the Audit Vault Data WarehouseOverview of Oracle Audit Vault Interface

Configuring Oracle Audit Vault

  • Registering Sources and Deploying Collectors
  • Overview of Oracle Database Collectors
  • Configuring the Oracle Source Database for CollectorsBasic Steps to Register an Oracle Source Database and Deploy Collectors
  • Creating the Source User in the Source Database

Managing Audit Settings
  • Using Audit Vault to Collect Audit Data
  • Introduction to Oracle Database Auditing


Introduction to Oracle Database Firewall

  • Understanding How Data is Compromised
  • Understanding Oracle’s Defense in Depth Security Approach
  • Oracle Database Security Solutions
  • Oracle Database Firewall (Overview)
  • Positive Security Model-Based Enforcement
  • Negative Security Model-Based Enforcement
  • Oracle Database Firewall Architecture
  • Protected Databases

Configuring Oracle Database Firewall

  • Configuring a Standalone Oracle Database Firewall System
  • Configuring an Oracle Database Firewall Management Server System
  • Creating an Enforcement Point
  • Oracle Database Firewall Operational Modes (Database Activity Monitoring, Database Policy Enforcement)
  • Oracle Database Firewall Logging
  • Oracle Database Firewall Logs
  • Determining the Protection Level for your Databases
  • Configuring System Administrator Users

Configuring Policies
  • Oracle Database Firewall Policy Enforcement
  • Policy Engine Flow
  • Configuring Policies
  • Oracle Database Firewall Preconfigured Policies
  • Creating Policy Files
  • Custom Policy Development Overview
  • Enabling the Firewall Analyzer to Understand Database Usage
  • Creating a Policy

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best