This course is designed as a foundation course that will teach participants basic relational database management system concepts in Oracle environment. This will help participants understand audit issues and audit techniques that will be taught in the next course on Audit, Control and Security of Oracle Database. Participants will learn how to:
• Build, query and manipulate Oracle databases to create simple applications
• Retrieve and manipulate data efficiently using powerful SQL features
• Create and manage database tables, views and sequences
• Maintain data integrity and enforce security with privileges and roles
• Compose reusable structured PL/SQL code with cursors and procedures
• Use indexes and PL/SQL optimization
• Program with packages and triggers
This course benefits those who are, or will be, auditing in Oracle database environment after attending the next Oracle Audit course. Relational database experience and familiarity with basic programming concepts are useful for such auditors. Oracle experience is not required to attend this course.
• ORACLE TECHNOLOGY OVERVIEW – Relational database concepts/Logical data modeling
• Specifying attributes, entities, relationships and candidate keys
• Installation, configuration and architecture / Defining SGA, processes and database files
• RETRIEVING AND CONTROLLING DATA –
• Assessing SQL fundamentals / Exploiting SQL techniques/Manipulating data
• DESIGNING AND FORMULATING THE DATABASE
• Applying the physical design / Mapping logical model to physical design
• Establishing a storage framework/Creating users and schemas
• Defining LOB and TIMESTAMP data / Constructing and managing tables
• Building tables with CREATE TABLE / Altering and dropping tables / Restoring data with Flashback
• Accessing OS files with external tables / Leveraging the data dictionary
• Creating scripts against the data dictionary / Developing views and sequences
• Maintaining integrity / Determining referential integrity with primary, unique and foreign keys
• Imposing business rules with CHECK constraints
• Handling transactions and data with deferred and enforced constraints
• Enforcing security/Enriching performance