Skip to Scheduled Dates
Course Overview
This course covers all aspects of the multitenant architecture, providing detailed information on the components of a CDB and its regular and application PDBs. You learn why and how to create and manage a CDB and its regular and application PDBs, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged PDBs in CDBs using various methods.
In addition, you learn how to ensure the security within the containers of the CDB. You create common and local users, grant common and local privileges and roles, and administer database security to meet your business requirements by using encryption, Database Vault and auditing.
This course includes CDB and PDBs backup, duplicate, recovery and flashback procedures.
You learn how to monitor the performance and manage resources within a CDB and its PDBs, and within each PDB.
It introduces the data movement capabilities between non-CDBs and PDBs, and between PDBs and learn about upgrade methods and paths.
Who Should Attend
- Administrator
- Architect
- Database Administrator
Course Objectives
- Manage PDB snapshots
- Encrypt data in PDBs and isolate PDB keystore
- Monitor performance in CDBs and PDBs
- Audit users in CDB and PDBs
- Protect data with Database Vault policies in CDB and PDBs
- Manage a CDB fleet
- Manage resource allocation between PDBs and within a PDB
- Use Data Pump operations from a non-CDB or CDB into a PDB
- Upgrade 12c CDBs or PDBs to 18c
- Configure and create a CDB
- Create, clone, unplug, plug, relocate, proxy, switch over and drop PDBs
- Startup and shutdown CDBs and PDBs
- Manage tablespaces in CDB and PDBs
- Manage common and local users, roles, privileges, profiles, objects in CDBs and PDBs
- Manage PDB lockdown profiles
- Backup, duplicate, recover and flashback CDB and PDBs
Course Outline
1 - Outline
- CDB Basics
- CDB and Regular PDBs
- Application PDBs and Application Installation
- PDB Creation
- CDB and PDB Management
- Storage
- Security
- Backup and Duplicate
- Recovery and Flashback
- Performance Monitoring
- Resources Allocation
- Data Movement
- Upgrade methods