To get, Oracle Certified Professional Oracle Database Security Expert Certification
Step-1: Complete this prior certification
Candidate must have one of the following certifications.
Oracle Database 12c Administrator Certified Professional (OR)
Database 12cR2 Administration Certified Professional (Retired) (OR)
Oracle Database Administration 2019 Certified Professional
Oracle Database 12c Administrator Certified Professional (OR)
Database 12cR2 Administration Certified Professional (Retired) (OR)
Oracle Database Administration 2019 Certified Professional
Step-2: Oracle Database Security Administration 1Z0-116
Duration: 150 Minutes
Number of Questions: 90
Passing Score: 59%
Validated Against: This exam is validated against 12c and higher versions.
Exam Topics
Duration: 150 Minutes
Number of Questions: 90
Passing Score: 59%
Validated Against: This exam is validated against 12c and higher versions.
Exam Topics
Overview
Assess security needs (risk reduction, regulatory compliance)
Assess the typical attack points for a database
Deploy the Maximum Security Architecture
Assess security needs (risk reduction, regulatory compliance)
Assess the typical attack points for a database
Deploy the Maximum Security Architecture
Manage and Secure passwords
Secure Passwords in scripts and applications
Change a user's password securely
Administer a secure external password store to secure passwords
Administer the Database Password File
Control the use of a password file
Secure Passwords in scripts and applications
Change a user's password securely
Administer a secure external password store to secure passwords
Administer the Database Password File
Control the use of a password file
Manage Authorization
Administer System and Object Privileges
Assign Administrative Privileges
Configure Secure Application Roles
Configure Global Roles (EUS/CMU)
Perform Privilege Analysis
Administer System and Object Privileges
Assign Administrative Privileges
Configure Secure Application Roles
Configure Global Roles (EUS/CMU)
Perform Privilege Analysis
Configure and Manage Database Vault
Describe the Default Separation of Duties with Database Vault
Configure Database Vault Factors, Rules, and Rule Sets
Configure Database Vault Mandatory and non-Mandatory Realms
Configure Database Vault Command Rules
Configure Realms, Command Rules, and Application Context to enforce trusted path access
Perform Database Vault Operations Control
Describe the Default Separation of Duties with Database Vault
Configure Database Vault Factors, Rules, and Rule Sets
Configure Database Vault Mandatory and non-Mandatory Realms
Configure Database Vault Command Rules
Configure Realms, Command Rules, and Application Context to enforce trusted path access
Perform Database Vault Operations Control
Configure Network Security
Assess the need for Network access control (ACL)
Manage Network ACLs in relation to microservice deployments
Configure ACLs to access passwords in a wallet
Configure Network Service Profiles
Configure and use Listener Valid-Node Checking
Enhance Database Communication Security with SEC_ parameters
Assess the need for Network access control (ACL)
Manage Network ACLs in relation to microservice deployments
Configure ACLs to access passwords in a wallet
Configure Network Service Profiles
Configure and use Listener Valid-Node Checking
Enhance Database Communication Security with SEC_ parameters
Implement Data Masking and Data Redaction
Implement Data Redaction
Implement Enterprise Manager Data Masking Pack
Configure and use the Application Data Model
Perform Sensitive Data Discovery
Deploy Data Masking Formats
Compare In-Database -vs- At-Source execution
Automate Masking operations with EMCLI
Configure Transparent Sensitive Data Protection (TSDP)
Implement Data Redaction
Implement Enterprise Manager Data Masking Pack
Configure and use the Application Data Model
Perform Sensitive Data Discovery
Deploy Data Masking Formats
Compare In-Database -vs- At-Source execution
Automate Masking operations with EMCLI
Configure Transparent Sensitive Data Protection (TSDP)
Patch Databases
Assess the need for of a CVE
Decode CVSS Risk Scoring
Assess the need for of a CVE
Decode CVSS Risk Scoring
Manage Database Users
Administer OS Authentication
Administer Kerberos Authentication
Administer PKI Certificate Authentication
Administer Enterprise User Security
Administer Centrally Managed Users
Identify Inactive accounts
Administer OS Authentication
Administer Kerberos Authentication
Administer PKI Certificate Authentication
Administer Enterprise User Security
Administer Centrally Managed Users
Identify Inactive accounts
Configure and Use Contexts
Understand and use USERENV variables
Understand and Use Client Identifiers
Extend Unified Auditing with Context information
Use context information with Secure Application Roles
Understand and use USERENV variables
Understand and Use Client Identifiers
Extend Unified Auditing with Context information
Use context information with Secure Application Roles
Configure Fine Grained Access Control
Configure Fine Grained Access Control (FGAC)
Configure FGAC with Real Application Security
Configure FGAC withVirtual Private Database
Configure FGAC with Oracle Label Security
Configure Fine Grained Access Control (FGAC)
Configure FGAC with Real Application Security
Configure FGAC withVirtual Private Database
Configure FGAC with Oracle Label Security
Configure and Use Auditing
Perform Privileged User Audit
Configure Standard Audit
Configure Fine Grained Auditing
Configure and use Unified Audit
Perform Privileged User Audit
Configure Standard Audit
Configure Fine Grained Auditing
Configure and use Unified Audit
Configure and Implement Encryption
Encrypt data in motion
Configure Native Network Encryption
Configure TLS Encryption
Encrypt data at rest with Transparent Database Encryption
Configure Column level and Tablespace level Encryption
Encrypt the Data Dictionary
Migrate unencrypted to encrypted data
Manage Encryption Keys
Administer and use the SYSKM Administrative Privilege
Administer Encryption Wallets
Encrypt data in motion
Configure Native Network Encryption
Configure TLS Encryption
Encrypt data at rest with Transparent Database Encryption
Configure Column level and Tablespace level Encryption
Encrypt the Data Dictionary
Migrate unencrypted to encrypted data
Manage Encryption Keys
Administer and use the SYSKM Administrative Privilege
Administer Encryption Wallets
Invoke the Database Security Assessment Tool
Run the Database Security Assessment Tool
Run the Database Security Assessment Tool
Manage Database Security in the Cloud
Assess the Shared Responsibility Model
Manage hybrid cloud scenarios
Assess Autonomous Database Self Securing
Assess the Shared Responsibility Model
Manage hybrid cloud scenarios
Assess Autonomous Database Self Securing
Hi Ravi, would you please recommend us some practise exams/mock details for this ?
ReplyDelete