Oracle - Course Details

IODF Implementing Oracle Database Firewall

Oracle Course Description:
In this course you will learn to configure an Oracle Database Firewall and an Oracle Database Firewall Management Server. You will learn to use enforcement points to deploy Database Firewall policies. You will use the Oracle Database Firewall Administration Console, a Web browser-based application for configuring, managing, and monitoring the system. You will configure stored procedure auditing and user role auditing. The configuration and use of local and remote monitoring is discussed in this course. Additional topics include reporting, archiving data, and email alerts.
Oracle Course Duration:
2 DAYS
Oracle Course Target Audience:
Database Administrators,Network Administrator,Security Administrators,Security Compliance Professionals
Oracle Course Prerequisite:
General knowledge of SQL,General knowledge of networks
Course Content:
  • Introduction to Oracle Database Firewall

    • Understanding How Data is Compromised
    • Understanding Oracle’s Defense in Depth Security Approach
    • Oracle Database Security Solutions
    • Oracle Database Firewall (Overview)
    • Positive Security Model-Based Enforcement
    • Negative Security Model-Based Enforcement
    • Oracle Database Firewall Architecture
    • Protected Databases

  • Installing Oracle Database Firewall

    • Installation Overview
    • Installing Database Firewall and Database Firewall Management Server
    • Logging in to the Administration Console
    • Installing the Firewall Analyzer
    • Database Firewall Sizing

  • Configuring Oracle Database Firewall

    • Configuring a Standalone Oracle Database Firewall System
    • Configuring an Oracle Database Firewall Management Server System
    • Creating an Enforcement Point
    • Oracle Database Firewall Operational Modes (Database Activity Monitoring, Database Policy Enforcement)
    • Oracle Database Firewall Logging
    • Oracle Database Firewall Logs
    • Determining the Protection Level for your Databases
    • Configuring System Administrator Users

  • Configuring Policies

    • Oracle Database Firewall Policy Enforcement
    • Policy Engine Flow
    • Configuring Policies
    • Oracle Database Firewall Preconfigured Policies
    • Creating Policy Files
    • Custom Policy Development Overview
    • Enabling the Firewall Analyzer to Understand Database Usage
    • Creating a Policy

  • Creating Advanced Configuration Policies

    • Using Profiles
    • Using a Novelty Policy
    • Novelty Policy Example
    • Creating a Novelty Policy

  • Reporting

    • Oracle Database Firewall Reporting System
    • Using the Summary Reports
    • Using the Summary Compliance Reports
    • Using the Search Log Function
    • Using Search Log Results
    • Creating Audit Reports
    • Using the Search Log Results in Audit Reports
    • Generating the Audit Report

  • Stored Procedure Auditing

    • Stored Procedure Auditing Overview
    • Stored Procedure Auditing Architecture
    • Creating Users and Setting Permissions for Stored Procedure Auditing
    • Enabling Stored Procedure Auditing
    • Auditing Changes to Stored Procedures

  • User Role Auditing

    • User Role Auditing Overview
    • User Role Auditing Architecture
    • Creating Users and Setting Permissions for User Role Auditing
    • Enabling user Role Auditing
    • Auditing Changes to User Roles

  • Configuring and Using Local Monitoring

    • Local Monitoring Overview
    • Oracle Database Firewall Architecture:Local Monitoring
    • Installing Oracle Database Firewall Monitoring Software
    • Installing Local monitoring in an Oracle Database
    • Installing Local monitoring in a Microsoft SQL Server Database
    • Installing Local monitoring in a Sybase ASE Database
    • Enabling Local Monitoring

  • Configuring and Using Remote Monitoring

    • Remote Monitoring Overview
    • Oracle Database Firewall Architecture: Remote Monitoring
    • Prerequisites for Remote Monitoring
    • Configuring the Remote Monitor in the Administration Console
    • Download the Configuration File
    • Contents of the remote-agent.conf FIle
    • Executing the Remote Monitor Script
    • Verifying that the Remote Monitor is Active

  • Additional System Management Tasks

    • Archiving Data
    • Configuring syslog Logging
    • Deleting Logs and History