Overview
Gain skills and knowledge needed to design and implement security policies to protect data from accidental, unauthorized, or inappropriate actions.
After completing this course, you will have the skills and knowledge necessary to design and implement security policies to protect data from accidental, unauthorized, or inappropriate actions. You will also be able to create and enforce practices of auditing and accountability for such actions. In addition, you will be able to develop applications that provide desired services securely in a variety of computational models, making use of database and directory services to maximize both efficiency and ease of use. This course is therefore essential for anyone who wants to work in the field of computer security.
Skills Covered
After completing this course, you will be able to:
- Designing and implementing security policies to protect the data of an organization, users, and applications from accidental, inappropriate, or unauthorized actions
- Creating and enforcing policies and practices of auditing and accountability for inappropriate or unauthorized actions
- Creating, maintaining, and terminating user accounts, passwords, roles, and privileges
- Developing applications that provide desired services securely in a variety of computational models, leveraging database and directory services to maximize both efficiency and ease of use you need a basic understanding of how and why a database is used, and basic familiarity with SQL.
Who Should Attend
This course intended for database administrators (DBAs), security administrators, application developers.
Course Curriculum
Course Modules
Exam & Certification
Oracle Database 19c: Monitoring and Maintaining a Secure Environment Certification Training.