Sie sind auf Seite 1von 2

Oracle University | Contact Us: 00 9714 390 9050

Oracle Security Overview

Duration: 1 Day

What you will learn


This Oracle Security Overview training highlights the security challenges organizations face today, along with solutions
for addressing these complex security issues. Decision Makers develop a deeper understanding of information about
various security issues and the impact they can have on an organization and more.

Learn To:

Use data redaction to provide necessary access to data, without exposing sensitive information
Define the security features available across Oracle infrastructure products.
Describe Java Security options and tools for creating secure applications.
Understand detailed solutions that can secure sensitive data while ensuring data integrity.

Benefits to You

Organizations are facing a constant threat of attacks to gain access to sensitive data. With both external and internal
threats, organizations must implement a comprehensive approach to security. Stricter laws are forcing organizations to
take further steps to protect privacy and date integrity.

By enrolling in this course, you'll develop an understanding of how Oracle takes a comprehensive approach to security
by providing protection across the entire stack. From infrastructure security to application security, learn how Oracle has
developed technologies and tools that provide a cost effective method for organizations to exceed compliance standards
and ensure their data is secure.

Audience
CIO/CTO
Data Center Manager
IT Director
Security Administrators

Course Objectives
Describe how preventative and detective controls can be used to secure database content

Define how data redaction is used to protect sensitive data

Describe how to use administrative controls to provide appropriate access to data across all roles

Describe how Oracle's Identity Goverance Product Suite provides identity managment provisioning, administration, and
monitoring

Copyright © 2013, Oracle. All rights reserved. Page 1


List mobile security elements

Describe methods for implementing security in Java applications

Describe the infrastructuer technologies available for securing data from the disk to the OS.

Course Topics

Secuirty Overview
The Security Problem
Business Challenges
Case Studies
Data Security

Securing the Infrastructure


Storage Security
Server Security
Virtualization Security
Operating System Security

Securing the Database


Database Risks
Oracle Database Security Solutions
Data Redaction
Data Masking
Database Firewall
Auditing and Reporting
Configuration Management

Identity Management
Oracle Identity Manager
Oracle Identity Analytics
Privileged Account Manager
Oracle Access Manager and Oracle Identity Federation
API Gateway
Entitlement Server
Oracle Directory Server Enterprise Edition
Oracle Virtual Directory

Java Security
Java Security
Java EE Security
Utilizing Security in Enterprise Java Applications

Copyright © 2013, Oracle. All rights reserved. Page 2

Das könnte Ihnen auch gefallen