Oracle Training Overview|
This Oracle 11g courseware training guide book will give attention to three fundamental pillars of effective implementation of PL/SQL applications. The PL/SQL programming language is at the core of most Oracle database applications. First, we will explore the advanced features of the language which allow powerful and effective database applications to be built. Next, we will discuss performance tuning techniques which allows these applications to run efficiently. Finally, we will consider critical security measures which should be implemented to counter hacker attacks and other security threats.
Oracle Training Course Objectives
Oracle Training Audience
The PL/SQL programming language is at the core of most Oracle database applications. This training course will give attention to three fundamental pillars of effective implementation of PL/SQL applications. First, we will explore the advanced features of the language which allow powerful and adaptable database applications to be built. Next, we will discuss performance tuning techniques which allows these applications to run efficiently. Finally, we will consider critical security measures which should be implemented to counter hacker attacks and other security threats.
- Invoking external procedures and integrating these into PL/SQL applications. These include external Java classes using the JDBC interface and external C programs contained within DLL libraries.
- Exploiting and managing cursor sharing and bind variables to maximize embedded SQL execution performance.
- Obtain the performance benefits that come from employing SQL and PL/SQL result caching.
- Using dynamic SQL to extend the functionality and flexibility of database programs, including the DBMS_SQL() system-supplied package for maximum flexibility.
- Identifying SQL injection attack vulnerabilities within an application and applying countermeasures to address security risks and protect against hacking.
- Incorporating collections and other advanced types into application logic to increase efficiency and execution speed.
- Working with LOBs, including piece-wise data manipulation and dynamic modification of SecureFile storage options.
- Expanding functionality with system-supplied database utility packages.
- Tuning with the DBMS_PROFILER() system-supplied package and debugging with the DBMS_TRACE() system-supplied package.
- Writing efficient PL/SQL code and avoiding common coding mistakes.
- Enabling native compilation and execution of all database-resident program units.
- Controlling and managing PL/SQL compilation for high-efficiency execution.
- Analyze PL/SQL code structure by means of the PL/Scope facility.
- Analyze PL/SQL application performance and tune bottlenecks using the PL/SQL Hierarachical Profiler.
- Recognizing the dangers of SQL injection attacks against PL/SQL applications and applying countermeasures to this potential security threat from hackers.
- Implementing fine-grained security mechanisms as part of an advanced security model using application contexts and the Oracle virtual private database (VPD).
- Dynamic partitioning and DML parallelization using the system-supplied package DBMS_PARALLEL_EXECUTE().
The target audience for this course is senior application developers. Developers who will be building, debugging and tuning PL/SQL program units will benefit from this course.
The following courses are suggested prerequisites:
Oracle Training Course duration
- ORACLE DATABASE 11g: SQL FUNDAMENTALS – COMPLETE LIBRARY
- ORACLE DATABASE 11g: PROGRAM WITH PL/SQL – COMPLETE LIBRARY
- ORACLE DATABASE 11g: NEW & ADVANCED FEATURES FOR DEVELOPERS
Oracle Training Course outline
- ADVANTAGES & DISADVANTAGES
- NATIVE DYNAMIC SQL
- Dynamic UPDATE...RETURNING
- DYNAMIC SQL USING DBMS_SQL()
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART I
- ABOUT COLLECTIONS
- BULK BIND USING COLLECTIONS
- COLLECTION METHODS
- MORE ABOUT THE RETURNING CLAUSE
- ADVANCED COLLECTION FEATURES
- Collection MULTISET Operations
- IN INDICES OF Clause
- IN VALUES OF Clause
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART II
- WHY RETRIEVE OBJECT DEFINITIONS?
- RETRIEVING DEFAULT METADATA
- RETRIEVING CUSTOMIZED METADATA
- Using OPEN() & CLOSE()
- Using SET_FILTER()
- Using SET_COUNT()
- Using ADD_TRANSFORM()
- Using FETCH DDL()
- About SYS.KU$_DDL
- About SYS.KU$_DDLS
- Calling FETCH_DDL()
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART III
SYSTEM-SUPPLIED PACKAGES: DBMS_REDEFINITION()
- FETCH CLOB()
- SET_FILTER() FOR DEPENDENT OBJECTS
- PRIMARY & DEPENDENT OBJECT DDL
SYSTEM-SUPPLIED PACKAGES: DBMS_LOB()
- ABOUT TABLE REDEFINITION
- USING DBMS_REDEFINITION()
SYSTEM-SUPPLIED PACKAGES: OTHERS
- WORKING WITH EXTERNAL BFILES
- WORKING WITH INTERNAL LOBS
- LoadBLOBFromFile(), LoadCLOBFromFile()
- DYNAMIC SECUREFILE OPTIONS
ADVANCED INTERFACE METHODS
- COMPRESSION WITH UTL_COMPRESS()
- Set SMTP_OUT_SERVER
- Calling The Send() Procedure
- Calling The Send_Attach_xxx() Procedures
PL/SQL ADVANCED PROGRAMMING & CODING TECHNIQUES
- ABOUT EXTERNAL PROCEDURES
- CALLING JAVA CLASSES
- CALLING C PROGRAMS
INFLUENCING ORACLE PL/SQL COMPILATION
- AUTONOMOUS TRANSACTIONS
- USING NOCOPY FOR PARAMETERS
- CHOOSING THE OPTIMUM DATA TYPE
- Avoiding Implicit Data type Conversion
- Choosing Between NUMBER And PLS_INTEGER
- About PLS_INTEGER
- Using SIMPLE_INTEGER
- CHAR Variables Of Different Lengths
- VARCHAR2 Variables Of Different Lengths
- CHAR Vs. VARCHAR2
- CHAR Vs. VARCHAR2 With An Equality Comparison
- USEFUL PL/SQL CODING TECHNIQUES
- HANDLING STRING LITERALS
DYNAMIC PARTITIONING & PARALLELIZATION
- PL/SQL COMPILER OPTIMIZATION
- CONTROLLING COMPILATION MESSAGES
- PL/SQL NATIVE EXECUTION
Course Outline - Volume B
- ABOUT DYNAMIC PARTITIONING (CHUNKS)
- CREATING & PROCESSING CHUNKS
- MONITORING CHUNK PROCESSING
APPLICATION TUNING WITH THE PL/SQL HIERARCHICAL PROFILER
PL/SQL DEBUGGING WITH DBMS_TRACE()
- WHAT IS THE HIERARCHICAL PROFILER?
- CONFIGURING THE PROFILER
- MANAGING PROFILER RUNS
- ANALYZING PROFILER DATA
- INTERPRETING THE RESULTS
PROTECTING AGAINST SQL INJECTION ATTACKS
- USING THE TRACE FACILITY
- DBMS_TRACE() TO MANAGE RUNS
- EXAMINING THE TRACE DATA
- EVENT_KIND Values
IMPLEMENTING VIRTUAL PRIVATE DATABASES
- UNDERSTANDING THE THREAT
- APPLYING COUNTERMEASURES
- UNDERSTANDING VPDS
- PREPARING FOR A VPD
- CONFIGURING A VPD
- MANAGING APPLICATION CONTEXTS
- Using SYS_CONTEXT()
- MANAGING POLICIES & SECURITY RULES