- Duration: 10 weeks
Module 1: Introduction
Module 2: Understanding Security Requirements
Module 3: Choosing Security Solutions
Module 4: Implementing Basic Database Security
Module 5: Securing Data on the Network
Module 6: Using Basic and Strong User Authentication
Module 7: Configuring Global User Authentication
Module 8: Using Proxy Authentication
Module 9: Using Privileges and Roles
Module 10: Using Privilege Analysis
Module 11: Using Application Contexts
Module 12: Implementing Virtual Private Database
Module 13: Implementing Oracle Label Security
Module 14: Redacting Data
Module 15: Using Oracle Data Masking and Subsetting
Module 16: Using Transparent Sensitive Data Protection
Module 17: Encryption Concepts and Solutions
Module 18: Encrypting with DBMS_CRYPTO Package
Module 19: Using Transparent Data Encryption
Module 20: Database Storage Security
Module 21: Using Unified Audit
Module 22: Using Fine-Grained Audit
Leave feedback about this
You must be logged in to post a comment.