This hands-on workshop covers Oracle Cloud Infrastructure Security Professional (2025): Hands-on Workshop. Gain practical experience through guided exercises and real-world scenarios in Oracle Cloud Infrastructure.
دوراتنا
Oracle Cloud Infrastructure Security Professional (2025): Hands-on Workshop
- الرئيسة /
- البنية التحتية السحابية لأوراكل /
- Oracle Cloud Infrastructure Security Professional (2025): Hands-on Workshop
دورة المحتوى
Module 1: Course Introduction
- Course Overview
- Course Description
- Target Audience
- Prerequisites
- Certification Exam Objectives
- Course Outline
- Skill Checks to Test Your Knowledge
- OCI Documentation: Exploring Resources
- ��Ask Your Instructor” Form
- Getting Started
Module 2: Security Fundamentals
- Shared Security Model
- Zero Trust Security
- Concept
- Principles
- Security Services Introduction
- Security Services Overview
- Object Storage Security
- Security Services Use Cases
- Security Questions
- Security Design and Controls
- Platform Security
- Physical Security: Data Center Site & Inside Data Center
- Operational Security
- Secure Connectivity
- Data and Application Protection
- Culture of Trust and Compliance
Module 3: OCI Identity and Access Management (IAM)
- Introduction to OCI IAM
- Authentication (AuthN) & Authorization (AuthZ)
- IAM Components
- Identity Domains
- What They Are
- Use Cases
- Lifecycle Management
- Creating Identity Domains (Demo Included)
- Identity Domain Types & Default Domains
- Administrator Users: Dos & Don’ts
- Managing Groups & Users
- Default Groups
- Group & User Creation (Demo Included)
- Administrator Roles
- Key Points, Types, and Demo
- IAM Policies
- Subjects Clause, Actions Clause, Placement
- Compartments
- Resource Compartments, Access, Interaction of Resources
- Movement Across Regions, Nested Compartments
- Compartment Quotas and Budgets (Demo Included)
Module 4: Advanced IAM Policies
- Policy Inheritance and Attachment (Demo Included)
- Conditional Policies & Examples (Demo Included)
- Enforcing Least Privilege: Advanced Policies
- Permissions & Network Sources (Demo Included)
- Tag-Based Access Control (Demo Included)
- Dynamic Groups & Policies (Demo and Scenarios)
- Optimizing IAM Policies
- Eliminating Duplicates
- Consolidating Membership
- Combining Policy Statements
- Pattern-Based Optimization
- Object-Level Granular Access Control for OCI Object Storage
- Organization Management
- Benefits, Governance Rules, and Demo
Module 5: Securing Access using IAM
- Password Policies
- Types and Demo
- Multi-Factor Authentication (MFA)
- Enablement and Demo
- Adaptive Security
- Risk Providers
- Passwordless Authentication
- Network Perimeter Security (Demo)
- OCI IAM Reports
- Types and Accessing Reports
- Notifications & Branding
Module 6: Oracle Access Governance Overview
- Course Overview & Introduction to Access Governance
- Why Access Governance is Important
- Oracle Access Governance Features and Benefits
- Identity Governance and Administration (IGA)
- Challenges with Ungoverned Identities
- Access Control Challenges
- Evolving Requirements
- IGA Capabilities
- Access Governance Architecture
- Functional and Physical Views
- Core Functional Areas
- Roles, Application Roles, and User Access Model
- Demo: Creating Access Governance Service Instance & Roles
Module 7: Identity Orchestration
- Core Functional Areas of Access Governance
- Identity Orchestration in Hybrid & Multicloud Environments
- Identity Provisioning and Reconciliation
- Integration with Authoritative Sources
- Connected Systems and Integration Architecture
- OIG and OCI Integration Examples
- Codeless Integration: Design Goals & Demo
- Integration with OCI IAM
- Custom Identity Attributes & Identity Marking
- Workforce & Consumer Users
- Access Control Mechanisms
- Access Requests & Approval Workflows
- Identity Collections (Demo)
- Access Bundles (Demo)
Role-Based Access Control (RBAC) & Policy-Based Access Control (PBAC) (Demos Included)
Module 8: Governance and Compliance
- Core Functional Areas in Governance and Compliance
- Enforcing Compliance through Access Reviews
- Campaigns and Access Reviews
- Policy Reviews & Event-Based Reviews
- Delegation in Access Governance (Demo Included)
- Identity Intelligence
- Key Capabilities
- Prescriptive Analytics and Insights
- Dashboards
- Enterprise-wide Access
- Identity Correlation
- Remediation (Demos Included)
Module 9: Virtual Cloud Network (VCN) Security
- OCI Architecture Overview
- Virtual Cloud Network (VCN) Concepts
- CIDR Notation & Examples
- IP Address Ranges, Subnets
- IAM Policies for Networking Admins/Users
- Compartments & NSGs
- Nuances of Different Verbs
- Demo: Public and Private Subnets
- VCN Security
- Security List (SL) & Network Security Groups (NSG)
- Stateful and Stateless Security Rules
- Bastion Host (Demos Included)
- Zero Trust Packet Routing (ZPR)
- Concept, Benefits, Setup, Use Case
- VCN Connectivity
- Connectivity Options
- Site-to-Site VPN (IPSec) & Configuration Workflow
- FastConnect Use Cases & Connectivity Providers
- IPsec VPN and FastConnect Summary
Module 10: Load Balancer Concepts
- Load Balancer Primer
- OCI Load Balancing Service
- OCI Flexible Load Balancer
- Fixed to Flexible Load Balancer
- HTTP/2 Support
- Public and Private Load Balancers
- Public Load Balancer (Regional Subnets & AD-Specific Subnets)
- Private Load Balancer (Using Regional & AD-Specific Subnets)
- Load Balancer Policies and Health Checks
- Load Balancing Policies
- Health Check
- SSL Handling
- LB with SSL Not Enabled
- Generate Private Key and CSR
- Generate Self-Signed Certificate
- Add Certificate to LB & Create Listener on Port 443
- SSL Termination Enabled for LB (Demo Included)
- High Availability with IP Hash Load Balancing
- Troubleshoot Load Balancer Critical Health Check Errors
- Certificates Overview
- TLS and Mutual TLS Connections
- Certificate Authority (CA) & Chain of Trust
- Types of Certificates, Certificate Pain Points
- OCI Certificates Service
- Lifecycle Management Features
- Use Cases: Public, Private, mTLS, Code Signing
- Demo: OCI Certificates
Module 11: OCI Network Firewall
- Why We Need a Firewall
- OCI Network Firewall Overview
- Deployment and Workflow
- Use Cases
- Perimeter Security
- Intrusion Detection and Prevention
- Selective Access to Oracle Services Network (OSN)
- Application Segmentation and Zero-Trust
- Network Firewall Policies
- Building Rules: Create Policy Workflow
- Policy Components
- Demo: OCI Certificates & Scenario
Module 12: Securing Applications in the Cloud
- Part 1: Objectives & Multiple Layers of Defense
- Web Application Firewall (WAF)
- OCI WAF Overview & Architecture
- WAF Points of Presence (PoPs)
- Use Cases
- OWASP Rules in OCI WAF
- Part 2: WAF Service Components
- Origin Management
- Protection Rules
- Access Control
- Bot Management
- Caching Rules
- Threat Intelligence
- Shared Responsibility Model
- الفوائد
- Required IAM Policies
- Getting Started with WAF: Prerequisites & Workflow
Demos: Load Balancer and WAF Policy, Creating WAF Policy, Enabling Protection Rules, Bot Management, Adding Access Control Rules
Module 13: Compute Security Best Practices
- Compute Security Recommendations
- Shielded Instances
- OCI Bastion Service
- Session Types: Managed SSH, Port Forward, Dynamic Port Forward
- OCI Bastion Details
- Required IAM Policies
- Demos: Manage Bastion, Port Forwarding
- Oracle OS Management Hub (OSMH)
- Challenges of IT Administrator
- Service Architecture & Dashboard
- Patch Updates: Simplify and Automate
- Supported Platforms & OCI IAM Policies
- Management Station & Lifecycle Environments
- Dedicated Virtual Machine Hosts
- Example Scenarios, Shapes, and Limitations
Module 14: OCI Vulnerability Scanning Service (VSS)
- Overview of OCI Vulnerability Scanning Service
- Setting up VSS
- Scanning Reports
- Cloud Guard Integration
Demos: Vulnerability Scanning, Cloud Guard Integration, Container Image Scanning
Module 15: OCI Key Management Service (KMS)
- OCI Encryption Options & KMS Portfolio
- Choosing the Right OCI KMS Offering
- Encryption Basics: At Rest, In-Transit, Symmetric, Asymmetric
- Hardware Security Module (HSM)
- Vault Introduction and OCI Vault
- Vaults, Keys, Master/Data Encryption Keys
- Key Management: Protection Modes, Wrapping, Rotating, Import/Export
- Demo: Encryption and Decryption of Data with Vault
- OCI Services Integration with Vault
- Oracle-Managed vs Customer-Managed Keys
- Object Storage Integration
- Backup, Restore, Cross-Region Replication
- Secrets Management
- Secret Rules
- Demos: Automate Secret Generation & Retrieve Secret using Instance Principal
- OCI Dedicated KMS
- Architecture, Workflow, Use Cases, Benefits
- OCI External KMS
- Overview, How it Works, Onboarding, Vaults, Key References, Use Cases
Module 16: Oracle Database Security
- Objectives & Data Vulnerability
- Database Security in OCI
- Controlled Access & Safeguarding Databases
- Data Encryption
- قاعدة البيانات Patching
- Security Assessment
- Autonomous Database (ADB) Security
- Oracle Data Safe
- Introduction & Features
- Security Assessment
- User Assessment
- Activity Auditing
- Data Discovery & Data Masking
- Architecture & Administration
- Target Database Connectivity: Public, Private Endpoints, On-Prem Connectors
Module 17: Cloud Security Posture Management (CSPM)
- Overview & Problem Statement
- CSPM Capabilities, Outcomes, and Benefits
- DevSecOps Integration
- Cloud Guard Introduction
- Supported Services & CIS OCI Foundations Benchmark
- Reporting Region
- Demo: Enable Cloud Guard
- Cloud Guard Concepts
- Targets, Detectors, Detector Rules & Recipes
- Problems, Responders, Responder Rules & Recipes
- Problem Processing & Managed Lists
- Notifications & Integration with Events Service
- Demos: Cloud Guard & Notifications
Module 18: OCI Threat Intelligence Service
- Threat Intelligence Overview
- Two Pillars of Threat Detection
- OCI Threat Intelligence Service & Concepts
- Demo: Threat Indicator Database
- Cloud Guard Threat Detector Integration
- Sighting Type Reference & Threat Detection Benefits
- Security Zones & Security Advisor
- Concepts, Policies
- Demos: Security Zones & Custom Security Zones
Module 19: Managing Security Operations
- Security Priorities & Observability Overview
- Monitoring Service
- Capabilities, Workflow, Demo
- Logging Service
- Concepts, Log Groups, Types, Searching Logs
- Audit Logs & IAM Policies
- Demos: Logging Service, Audit Events
- Ingesting Logs for Analytics
- Sources: Compute, Object Storage, OCI Cloud Services, On-Demand Upload
- Service Connector & Configuration Parameters
- Logging Analytics
- Insights, Architecture, Storage, Log Archiving, Log Explorer
- Dashboards, OCI Audit Analysis, Log Clustering
- Audit Service
- Audit Log Viewing, IAM Policies
- Demo: Logging Analytics with Management Agent
- Notifications & Events Service
- Overview, Creating Topics, Rule Actions, Event Metrics
- Demo: Notifications and Events Service
ذات صلة الدورات
Oracle قاعدة البيانات السحابة Migration Professional 2024 ELS
Zero Downtime Migration (ZDM) Techniques: Discover advanced methods such as..
يومان
10 محاضرة
استخدام Oracle Machine Learning مع Autonomous قاعدة البيانات 2024 ELS
Use this as a launching point for exploring the rich..
يومان
4 محاضرات
Oracle Autonomous Database ورشة عمل 2024 ELS
Benefits to you Learn the technical architecture of Oracle Autonomous..
3 أيام
19 Lectures
Oracle Cloud Database Service Professional ورشة عمل (2025) LVC
This course equips database professionals, DevOps engineers, and cloud architects..
يومان
10 محاضرة
Oracle Cloud Database Service Professional ورشة عمل 2024 ELS
At the end of this training, you will be prepared..
يومان
10 محاضرة
Application Integration on Oracle Cloud Ed 5 LVC
This training teaches you about leveraging Oracle Integration Cloud to..