Outsourcing DBA? Your DBA can access your important data?
Find the solution with Oracle Database 10*g*: Implementing Database Vault Location : Oracle University, PT Oracle Indonesia. Sentral Senayan 1, 9th Floor, Jakarta Dates : 28-29 May 2007 Instructor : Yulius Wibowo Pricing : 420 USD Facility : 1 Computer, Snack and Sofdrink, Lunch, Student Kit, OU Certificate, OU Souvenir More Info? Contact : *For Inquiry please call :* ** Anna Cahyawati - 021 5723222 ext 1077, [EMAIL PROTECTED] Wahyu Tri Estiadi, 021-5723222 ext 1078, [EMAIL PROTECTED] Yudi Adicawarman, 021-5723222 ext 1022, [EMAIL PROTECTED] Oracle Database 10*g*: Implementing Database Vault What you will learn: Database Vault is a new option that helps a DBA meet the security goals of an organization. There are more and more requirements being put on systems regarding separation of duties and privacy and protection of data, including insider threats. A DBA needs to understand these requirements, and also the tools available for meeting them. This course introduces the student to Database Vault, including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices *Learn To:* - Install Database Vault into an existing database - Understand the Database Vault API capabilities - Configure components that restrict DBA privileges as needed - Audit access to database objects as needed Audience: Data Warehouse Administrator Data Warehouse Analyst Database Administrators Sales Consultants Technical Consultant Prerequisites: Required Prerequisites: Working knowledge of SQL Suggested Prerequisites: Working knowledge of PL/SQL Oracle Database 10*g*: Security<http://education.oracle.com/pls/web_prod-plq-dad/cdesc?dc=D17499GC10&p_org_id=15942&lang=US&p_preview=N> Course Objectives: Install Database Vault Configure Realms to protect schemas or application data Define multiple factors that represent characteristics of a user or session Integrate factor values with Oracle Label Security Audit Database Vault component accesses Define custom rules for allowing access to data Use the Database Vault browser interface Monitor and report on security configuration issues and access violations Return to top<http://education.oracle.com/pls/web_prod-plq-dad/cdesc?dc=D44719GC10&p_org_id=15942&lang=US&p_preview=N&source_call=#top> ------------------------------ Course Topics: Understanding the Database Vault Option Describing Scenarios Identifying the Components of Database Vault Using the Database Vault Administrator Software Understanding How Database Vault Components Relate to One Another Installing Database Vault Listing the Requirements Running the Installer Software Listing the Accounts and Schemas that are Created Configuring Realms Using Realms to Provide Separation of Duties Creating Realms that Protect Schemas and Applications Using Realms to Protect Role Granting Understanding the Views that Describe Realm Data Understanding the API that Configures Realms Defining Factors Listing the Predefined Factors in Database Vault Auditing the Use of Factors Listing the Differences Between Factors and Context Variables Creating Factors Using Constants Creating Factors that Refer to PL/SQL Procedures Creating Factors that Rely on Other Factors Identifying the Difference Between "For Session" and "By Access" Factors Validating a Factor's Value Defining Identities Understanding the Purpose of Identities Understanding the Difference Between Identities and Factors Mapping Factors to Identities Assigning Oracle Label Security to Identities Assigning Trust Levels to Identities Describing the Identity Views Defining Rule Sets Creating "Any True" and "All True" Rule Sets Auditing the Use of Rule Sets Defining a Rule Set Handler to Customize Rule Set Behavior Using Rule Sets to Customize Realm Access Using Rule Sets to Control Setting of Factors Understanding the Rule Set API Using the Rule Set Views Reporting on Rule Set Configuration Issues Configuring Command Rules Creating Command Rules Using Command Rules to Customize Control of Specific Command Execution Listing the Delivered Command Rules Using the Command Rule Views Reporting on Misconfigured Command Rules Using the Command Rule API Configuring Secure Application Roles Creating Secure Application Roles Using Rule Sets with Secure Application Roles Using Secure Application Roles to Customize Data Access Auditing Secure Application Roles Reporting on Secure Application Role Configuration Issues Viewing Reports Listing the Database Vault Reporting Capabilities Reporting on Configuration Changes Reporting on Component Configuration Problems Viewing Audit Reports Viewing Database Security Issues Reports Implementing Best Practices Defining Separation of Duties Using Realms Setting Up an Application DBA Account Enabling and Disabling Database Vault Diagnosing Database Vault Locking Down SYSDBA Usage Preventing Accidental Loss of Data Locking into an Application Server Improving Performance of Database Vault Components Return to top<http://education.oracle.com/pls/web_prod-plq-dad/cdesc?dc=D44719GC10&p_org_id=15942&lang=US&p_preview=N&source_call=#top> [Non-text portions of this message have been removed]

