Oracle Data Vault Training at Oracle Trainings Includes numerous Oracle & partner enterprise applications like Oracle E-Business Suite, PeopleSoft, Siebel & SAP Oracle Data Vault Course Content: Database Vault Overview • Overview of Database Vault elements & functionality • Component relationships • Database Vault effects & examples • Database Vault Administrator • Reporting & monitoring • Database Vault API • Manage the Database Vault database using Enterprise Manager Configuring Database Vault • Enabling Oracle Database Vault • Configure the Oracle database for Database Vault • Database parameters altered during configuration • Login into DVA • roles of Database • Database Vault account • Database Vault schemas Configuring Realms • Realms: Concepts • Creating & editing realms • Deleting realms • The realm algorithm • Examples of realms • Delivered realms • Realm views • Monitoring & reporting of realms Defining Rule Sets • Rule sets: Concepts • Creating & editing rule sets • Rule sets Deleting • Rules Reusing rules • Auditing rule sets • Custom event handlers • Using rule sets with realms • Rule set examples Configuring Command Rules • Command Rules: Concepts • Creating & editing command Rules • Delivered command rules • view of DBA_DV_COMMAND_RULE • Command rule report • Command rule API Extending Rule Sets • Factors: Concepts • Factor scenarios • Creating & editing factors • Managing factors • Identities: Concepts • Purpose of identities • Identity Creating • Identities Managing Configuring Secure Application Roles • Secure application roles: Concepts • Creating & editing secure application roles • Deleting secure application roles • Secure application roles: Examples • Managing secure application roles Database Vault Reports Viewing • Monitoring Database Vault • Configuration reports • Reports of Auditing • Reports of Security • Object privilege report • Accounts & roles reports • Privilege summary reports • System privileges reports Implementing Best Practices • Identifying your security requirements • Suggested naming convention • Duty best practices Separation • Identifying your security requirements • Audit all violations • Connection pooling considerations • Enforce the connections from an application server • Performance considerations