Threats to data security abound and are increasing in sophistication and frequency. Organizations have both an ethical and oftentimes a legal responsibility to understand the countermeasures available, to compare these against those threats to which they are exposed, and to properly apply such countermeasures.
This training course module considers how encryption technology should, and should not, be employed within an Oracle database environment in response to known threats and risks. It will also discuss other best security practices which pertain to application security, host system configuration and the database installation.
For groups of 5 or more, let Intertech bring this course to your location. Customized versions tailored towards your objectives are also available.Learn More
Within this training course we will discuss these topics:
The primary target audiences for this course are: