We may earn an affiliate commission when you visit our partners.
Tim Boles

Ensuring your organization meets security, privacy, and compliance requirements is a must in today's world. This course will teach you all about the new security features within Oracle 12c and how to take full advantage of them.

Read more

Ensuring your organization meets security, privacy, and compliance requirements is a must in today's world. This course will teach you all about the new security features within Oracle 12c and how to take full advantage of them.

As security breaches occur more and more frequently, protecting and limiting the use of personal and other sensitive information is absolutely imperative. How do you do that without disrupting your users or workers? In this course, OCP 12c Using the New Security Features, you will learn how the new security features of Oracle 12c, provide extra layers of protection and monitoring for your databases. First, you will learn about auditing abilities with the Unified Audit Trail and audit policies. Next, you will dive into privilege analysis and data redaction policies. Finally, you will learn about new administrative features that support separation of users duties and limiting access according to the least privileges needed for best practices. When you are finished with this course, you will have a firm grasp of all the new security features and how to use them accordingly to protect the most sensitive of information.

Enroll now

What's inside

Syllabus

Course Overview
Auditing - Enable and Configure the Unified Audit Trail
Auditing – Modes and the Multitenant Architecture
Auditing - Configure and Enable Audit Policies
Read more
Capturing of Extended and "Other" Sources Audit Information
Privileges - New Administrators and Their Purpose
Privileges – How to Use the Privilege Analysis Feature
Oracle Data Redaction Policies Usage and Management
Wrapping up New Security Features

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers data redaction policies, a useful tool to protect sensitive data
Fits database security experts who want to leverage new features in Oracle 12c
Builds upon existing skills to strengthen security in database environments
Instructors Tim Boles have experience in the industry

Save this course

Save OCP 12c Using the New Security Features to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in OCP 12c Using the New Security Features with these activities:
Organize course materials for easy reference
Establish a structured approach to your learning by organizing course materials effectively.
Show steps
  • Create a dedicated folder or digital space for course materials.
  • Sort and categorize materials into subfolders or sections based on topics or themes.
  • Use color coding or tags to highlight important or frequently referenced materials.
  • Develop a system for naming files and folders to ensure easy retrieval.
Review Oracle 11g Database Security Concepts
Brush up on the foundational concepts of database security in Oracle 11g to enhance your understanding of the advancements introduced in Oracle 12c.
Show steps
  • Gather materials and resources on Oracle 11g database security concepts.
  • Review core concepts such as authentication, authorization, auditing, and encryption.
  • Identify areas where the security features of Oracle 12c build upon or enhance those of Oracle 11g.
Join a study group to discuss course topics
Engage in collaborative learning by discussing course concepts, sharing insights, and clarifying doubts with peers.
Browse courses on Oracle 12c
Show steps
  • Reach out to classmates or join an existing study group.
  • Set up regular meetings to discuss the course material.
  • Prepare for each meeting by reviewing the assigned readings and completing any required exercises.
  • Actively participate in discussions, asking questions, sharing perspectives, and summarizing key points.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow a tutorial on privilege analysis
Gain practical insights into how to use privilege analysis to assess user permissions and identify potential risks.
Show steps
  • Search for a tutorial on privilege analysis for Oracle 12c.
  • Follow the steps in the tutorial to perform privilege analysis on a sample database.
  • Analyze the results and identify any excessive or unnecessary privileges.
Practice auditing with the Unified Audit Trail
Develop a stronger understanding of the Unified Audit Trail and its usage for database auditing.
Show steps
  • Review the documentation on the Unified Audit Trail.
  • Set up a test database and enable the Unified Audit Trail.
  • Generate audit records by performing various database operations.
  • Examine the audit records to understand the captured information.
Create a presentation on Oracle Data Redaction Policies
Enhance your understanding and presentation skills by explaining the concepts and usage of Oracle Data Redaction Policies.
Browse courses on Data Security
Show steps
  • Gather information about Oracle Data Redaction Policies from the provided course materials and additional resources.
  • Develop an outline for your presentation, including key concepts and examples.
  • Create slides using visuals and text to explain the purpose, benefits, and implementation of Data Redaction Policies.
  • Rehearse your presentation for clarity and effectiveness.
Contribute to the Oracle Linux Kernel Security Module
Gain practical experience in open-source software development and contribute to the security of the Oracle Linux platform.
Show steps
  • Fork the project repository on GitHub.
  • Identify an area where you can make a meaningful contribution.
  • Implement your changes and write unit tests to verify their functionality.
  • Submit a pull request to the project repository.
  • Collaborate with other developers to review and refine your contribution.

Career center

Learners who complete OCP 12c Using the New Security Features will develop knowledge and skills that may be useful to these careers:
Database Security Analyst
As a Database Security Analyst, you will be responsible for protecting the security of databases. This course will help you develop the skills you need to identify and mitigate security risks, and to implement security controls to protect databases from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive database security strategy.
Database Administrator
Database Administrators are responsible for the day-to-day operation and maintenance of databases. This course will help you develop the skills you need to manage and administer databases, including how to implement security features to protect databases from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive database security strategy.
Information Security Analyst
Information Security Analysts are responsible for protecting the security of information systems. This course will help you develop the skills you need to identify and mitigate security risks, and to implement security controls to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive information security strategy.
Security Architect
Security Architects are responsible for designing and implementing security solutions for organizations. This course will help you develop the skills you need to identify and mitigate security risks, and to design and implement security solutions to protect organizations from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive security architecture.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course will help you develop the skills you need to identify and mitigate security risks, and to advise organizations on how to implement security controls to protect their information assets. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive security strategy.
Security Engineer
Security Engineers are responsible for implementing and maintaining security solutions for organizations. This course will help you develop the skills you need to identify and mitigate security risks, and to implement and maintain security solutions to protect organizations from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive security solution.
Security Manager
Security Managers are responsible for overseeing the security of organizations. This course will help you develop the skills you need to identify and mitigate security risks, and to manage security programs to protect organizations from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive security management program.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation and maintenance of computer systems. This course will help you develop the skills you need to manage and administer computer systems, including how to implement security features to protect systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive system security strategy.
Network Administrator
Network Administrators are responsible for the day-to-day operation and maintenance of computer networks. This course will help you develop the skills you need to manage and administer computer networks, including how to implement security features to protect networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all essential for developing a comprehensive network security strategy.
Software Developer
Software Developers are responsible for designing, developing, and maintaining software applications. This course may be useful for Software Developers who are interested in developing secure software applications. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for developing software applications that are resistant to unauthorized access, use, disclosure, disruption, modification, or destruction.
Quality Assurance Analyst
Quality Assurance Analysts are responsible for testing and verifying the quality of software applications. This course may be useful for Quality Assurance Analysts who are interested in testing and verifying the security of software applications. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for testing and verifying the security of software applications.
Business Analyst
Business Analysts are responsible for gathering and analyzing business requirements. This course may be useful for Business Analysts who are interested in gathering and analyzing security requirements. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for developing security requirements that are aligned with business needs.
Project Manager
Project Managers are responsible for planning and managing the implementation of projects. This course may be useful for Project Managers who are interested in managing the implementation of security projects. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for planning and managing the implementation of security projects.
Technical Writer
Technical Writers are responsible for writing and maintaining technical documentation. This course may be useful for Technical Writers who are interested in writing and maintaining security documentation. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for writing and maintaining security documentation that is accurate, clear, and concise.
Trainer
Trainers are responsible for providing training on a variety of topics. This course may be useful for Trainers who are interested in providing training on security topics. This course covers topics such as auditing, privilege analysis, and data redaction policies, which are all important for providing training on security topics.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in OCP 12c Using the New Security Features.
Offers in-depth coverage of Oracle Database 12c, including security topics.
Is an in-depth reference guide for Oracle Database Auditing. The author is an Oracle ACE and Oracle Certified Expert for Oracle Database Security specializing in Oracle Database Auditing.
Provides a comprehensive overview of security in Oracle databases, covering topics such as auditing, authorization, encryption, and network security.
Provides a comprehensive reference manual for Oracle database security features, including detailed explanations and technical specifications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to OCP 12c Using the New Security Features.
OCP 12c Performing Backup and Recovery Using New Features...
Most relevant
OCP 12c Using Performance Enhancements in Oracle 12c
Most relevant
Oracle Database 12c Fundamentals
Most relevant
OCP Upgrade to Oracle Database 12c Management
Most relevant
Learning Oracle 12c - A Beginners Oracle Training Video
Most relevant
Oracle Database RAC Administration (12c and 19c)
Most relevant
Oracle WebLogic 12c for Administrators
Most relevant
The Complete PL/SQL Bootcamp : "Beginner to Advanced...
Most relevant
Oracle DBA 11g/12c - Database Administration for Junior...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser