Join David Yahalom for an in-depth discussion in this video Configure the keystore, part of Oracle Database 12c: Security.
- [Instructor] Oracle supports the capability…to encrypt data that is stored inside database tables.…This type of encryption is known as data at rest encryption…and can help prevent data theft by physical access…to the database storage.…The various data at rest encryption capabilities…of Oracle 12c are collectively known…as transparent data encryption or TDE in short.…
So let's see transparent data encryption in action.…Our first step is to create a software keystore,…which is a container or directory…for the TDE master encryption key.…This encryption key is required for encryption to work.…The encryption key resides…in the operating system file system.…So make sure you have a terminal window open.…Our first step is to create a directory…for the keystore file.…
So I'll type mkdir $ORACLE_HOME in capital letters /wallet.…This is just a simple example where I'm creating…a wallet directory inside my Oracle home software directory.…We have to choose a location to which…the Oracle operating system user has access to.…
Learn how to identify the major risks and security threats, and review general best practices for properly protecting and "hardening" any production database. Then, dive into hands-on demos that show how to set up user accounts, the connection between users and schemas, database object and system permissions, and roles in a multitenant environment, as well as encrypt data, audit user actions, and access to sensitive information. Plus, find out how to enable data-at-rest security via the Oracle Transparent Data Encryption and backup encryption options.
- Core concepts of Oracle database security
- Potential threats to Oracle database security
- Authentication and authorization
- Auditing access
- Data encryption
- Users and permissions
- Database roles
Skill Level Intermediate
Oracle 12c Database: Administrationwith David Yahalom3h 58m Beginner
Database Foundations: Core Conceptswith Adam Wilbert2h 14m Beginner
Database Foundations: Administrationwith Adam Wilbert1h 14m Beginner
1. Database Security Fundementals
2. Advanced Database Security Concepts
3. Download and Set Up the Course VM
4. Users and Permissions
5. Database Roles
Roles with ADMIN OPTION3m 24s
6. Auditing Access to Data
7. Data Encryption
What's next?1m 46s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.