Course Overview
In this course you will learn to configure an Oracle Database Firewall and an Oracle Database Firewall Management Server. You will learn to use enforcement points to deploy Database Firewall policies. You will use the Oracle Database Firewall Administration Console, a Web browser-based application for configuring, managing, and monitoring the system. You will configure stored procedure auditing and user role auditing. The configuration and use of local and remote monitoring is discussed in this course. Additional topics include reporting, archiving data, and email alerts.
You will use the Oracle Database Firewall Analyzer to create policies that the Oracle Database Firewall uses to block, alert, log or permit SQL statements.
Learn To:
- Use Oracle Database Firewall to monitor and block unauthorized SQL traffic before it reaches the database
- Create a defensive perimeter that helps prevent SQL injection, application bypass, and other malicious activity from reaching the database
- Create white-list, black-list, and exception-list based policies to protect databases
- Generate customized reports to comply with regulations
Who should attend
- Database Administrators
- Security Administrators
- Security Compliance Professionals
- Network Administrator
Prerequisites
Required Prerequisites:
- General knowledge of SQL
Suggested Prerequisites:
- General knowledge of networks
Course Objectives
- Understand how to Install Oracle Database Firewalls and Oracle Database Firewall Management Server
- Configure an Oracle Database Firewall and Oracle Database Firewall Management Server
- Configure data policies to protect databases
- View predefined and generate customized summary, compliance, and audit reports
- Archive data
- Configure stored procedure auditing
- Configure user role auditing
- Configure local monitoring
- Configure remote monitoring
Course Content
- Introduction to Oracle Database Firewall
- Installing Oracle Database Firewall
- Configuring Oracle Database Firewall
- Configuring Policies
- Creating Advanced Configuration Policies
- Reporting
- Stored Procedure Auditing
- User Role Auditing
- Configuring and Using Local Monitoring
- Configuring and Using Remote Monitoring
- Additional System Management Tasks