Addressing vulnerabilities
Application DBAs
Application Program Interfaces (APIs)
Application vs . Cloud DBA
Artificial Intelligence (AI)
Auditing
Augmented Reality (AR)
Authentication
Authorization
Automation DBAs
code automation
dependencies
monitoring
schedule
security
tasks
test plans
Big data
Business intelligence
Capacity planning, Cloud DBA
Change management
Chief Cloud Officer (CCO)
Chief Data Officer (CDO)
Chief Security Officer (CSO)
Cisco Virtual Networking
Cloud Appliance
Cloud computing
Cloud databases
Cloud database tasks
Cloud DBAs
vs . applications
capacity planning
Cloud Control
creation of
data analysis
data migration
vs . DBaaS
discovering
evaluation
security features
tasks
tools
types of
workload analysis
Cloud Engineered System
Cloud providers
Cloud security
Cloud Service Models
Cloud therapy
Code automation
Common Vulnerability Scoring System (CVSS)
Container database (CDB)
Cyber Security Framework
Database administration (DBA)
application
automation
career paths
defined
high availability
infratructure
manageability
recovery
skill set
soft skills
storage
system
technical skills
Database administrators
job satisfaction
skill development
Database as a Service (DBaaS)
APIs
vs . cloud DBA
definition
design and advantages
Database creation
Database Machine Administrator (DMA)
appliances
automation
Cloud Engineered System
control of
design and architecture decisions
evaluation
Exadata Database Machine
SuperCluster
Database objects
Database platform
Database security
addressing vulnerabilities
auditing
DBA teams
evaluation
reducing risk
reporting
security learning
security planning
security team
Database servers
Database technology
data types
storage
Data collection
Data flows
Data integrations
Data management
Data migrations
Data modeling
Data ownership
Data professionals
Data protection
Data quality
classification
development process
and governance
MDM
Data retention
Data Warehouse
Data workflows
Disk operations
Disruptors
security
social networking
technology
Enterprise Cloud Control
Enterprise database
Enterprise thinking
Exadata Database Machine
Extract, load, transform (ETL) processes
General Data Protection Regulation (GDPR)
Hybrid clouds
Identity theft
Infrastructure as a Service (IaaS)
Interpersonal skills
Leadership
developing skills
team building
team goals
Massively Parallel Processing (MPP) databases
Master Data Management (MDM)
Mentoring
Microsoft SQL Server
Mobile Data Traffic
National Vulnerability Database
On-demand services
Oracle 12c
Oracle Cloud
Oracle Cloud Manager
Oracle Data Integrator (ODI)
Oracle Enterprise Cloud Control
Oracle Enterprise Manager
Oracle Exadata engineered systems
Oracle machine offerings
Organizational chart
Password management
Performance tuning
Platform as a Service (PaaS)
Pluggable databases (PDB)
Privacy
Private clouds
Public cloud
Real Application Clusters (RAC)
Real Application Testing (RAT)
Security Information and Event Management (SIEM)
Security learning
Security planning
Security teams
Server OS
Service-level agreements
Service-oriented architecture
Skill learning plan
Social networking
Soft skills
adaptability
communication
documentation
leadership
organizational
relationship building
Software as a Service (SaaS)
Solid State Disks (SSD)
Standardization security in Cloud
SuperCluster
Systems DBA
Technical skills
Core vs . Oracle
installs and upgrades
platform-specific
testing and implementation
Test environment
Transformation plan
acquiring
DBA skills
evaluation
planning
Unit testing
Virtualization
Virtual reality (VR)
Vulnerabilities
addressing
and risks
Work-life balance
Workload analysis