When considering Oracle security, you must also consider the security of the listener, which is the gateway to the network and the network itself. This course describes the items on the client, listener, and network security checklists. It demonstrates how to secure administration of the network, restrict access by IP address, and encrypt network traffic. Restricting the privileges of the listener, administering the listener securely, and monitoring listener activity are also covered.
0 reviews
Provider:
Training Location:
Price:
Duration:
Certificate: