Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Oracle Database 11g R2: Advanced PL/SQL Programming & Tuning
Oracle Training Overview

This Oracle 11g courseware training guide book will give attention to three fundamental pillars of effective implementation of PL/SQL applications. The PL/SQL programming language is at the core of most Oracle database applications. First, we will explore the advanced features of the language which allow powerful and effective database applications to be built. Next, we will discuss performance tuning techniques which allows these applications to run efficiently. Finally, we will consider critical security measures which should be implemented to counter hacker attacks and other security threats.

Oracle Training Course Objectives

The PL/SQL programming language is at the core of most Oracle database applications. This training course will give attention to three fundamental pillars of effective implementation of PL/SQL applications. First, we will explore the advanced features of the language which allow powerful and adaptable database applications to be built. Next, we will discuss performance tuning techniques which allows these applications to run efficiently. Finally, we will consider critical security measures which should be implemented to counter hacker attacks and other security threats.
  • Invoking external procedures and integrating these into PL/SQL applications. These include external Java classes using the JDBC interface and external C programs contained within DLL libraries.
  • Exploiting and managing cursor sharing and bind variables to maximize embedded SQL execution performance.
  • Obtain the performance benefits that come from employing SQL and PL/SQL result caching.
  • Using dynamic SQL to extend the functionality and flexibility of database programs, including the DBMS_SQL() system-supplied package for maximum flexibility.
  • Identifying SQL injection attack vulnerabilities within an application and applying countermeasures to address security risks and protect against hacking.
  • Incorporating collections and other advanced types into application logic to increase efficiency and execution speed.
  • Working with LOBs, including piece-wise data manipulation and dynamic modification of SecureFile storage options.
  • Expanding functionality with system-supplied database utility packages.
  • Tuning with the DBMS_PROFILER() system-supplied package and debugging with the DBMS_TRACE() system-supplied package.
  • Writing efficient PL/SQL code and avoiding common coding mistakes.
  • Enabling native compilation and execution of all database-resident program units.
  • Controlling and managing PL/SQL compilation for high-efficiency execution.
  • Analyze PL/SQL code structure by means of the PL/Scope facility.
  • Analyze PL/SQL application performance and tune bottlenecks using the PL/SQL Hierarachical Profiler.
  • Recognizing the dangers of SQL injection attacks against PL/SQL applications and applying countermeasures to this potential security threat from hackers.
  • Implementing fine-grained security mechanisms as part of an advanced security model using application contexts and the Oracle virtual private database (VPD).
  • Dynamic partitioning and DML parallelization using the system-supplied package DBMS_PARALLEL_EXECUTE().
Oracle Training Audience

The target audience for this course is senior application developers. Developers who will be building, debugging and tuning PL/SQL program units will benefit from this course.

Prerequisites

The following courses are suggested prerequisites:
  • ORACLE DATABASE 11g: SQL FUNDAMENTALS – COMPLETE LIBRARY
  • ORACLE DATABASE 11g: PROGRAM WITH PL/SQL – COMPLETE LIBRARY
  • ORACLE DATABASE 11g: NEW & ADVANCED FEATURES FOR DEVELOPERS
Oracle Training Course duration

5 Days

Oracle Training Course outline

Volume A

DYNAMIC SQL
  • ADVANTAGES & DISADVANTAGES
  • NATIVE DYNAMIC SQL
  • Dynamic UPDATE...RETURNING
  • DYNAMIC SQL USING DBMS_SQL()
USING COLLECTIONS
  • ABOUT COLLECTIONS
  • BULK BIND USING COLLECTIONS
  • COLLECTION METHODS
  • MORE ABOUT THE RETURNING CLAUSE
  • ADVANCED COLLECTION FEATURES
  • Collection MULTISET Operations
  • IN INDICES OF Clause
  • IN VALUES OF Clause
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART I
  • WHY RETRIEVE OBJECT DEFINITIONS?
  • RETRIEVING DEFAULT METADATA
  • RETRIEVING CUSTOMIZED METADATA
  • Using OPEN() & CLOSE()
  • Using SET_FILTER()
  • Using SET_COUNT()
  • Using ADD_TRANSFORM()
  • Using FETCH DDL()
  • About SYS.KU$_DDL
  • About SYS.KU$_DDLS
  • Calling FETCH_DDL()
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART II
  • SET_TRANSFORM_PARAM()
  • GET_QUERY()
SYSTEM-SUPPLIED PACKAGES: DBMS_METADATA() – PART III
  • FETCH CLOB()
  • SET_FILTER() FOR DEPENDENT OBJECTS
  • SET_PARSE_ITEM()
  • PRIMARY & DEPENDENT OBJECT DDL
SYSTEM-SUPPLIED PACKAGES: DBMS_REDEFINITION()
  • ABOUT TABLE REDEFINITION
  • USING DBMS_REDEFINITION()
  • DBA_REDEFINITION_ERRORS
  • CAN_REDEF_TABLE()
  • START_REDEF_TABLE()
  • FINISH_REDEF_TABLE()
  • ABORT_REDEF_TABLE()
  • COPY_TABLE_DEPENDENTS()
  • SYNC_INTERIM_TABLE()
SYSTEM-SUPPLIED PACKAGES: DBMS_LOB()
  • WORKING WITH EXTERNAL BFILES
  • WORKING WITH INTERNAL LOBS
  • LoadBLOBFromFile(), LoadCLOBFromFile()
  • Compare()
  • GetLength()
  • Append()
  • Copy()
  • Erase()
  • Trim()
  • Read()
  • SUBSTR()
  • INSTR()
  • Write()
  • DYNAMIC SECUREFILE OPTIONS
  • GetOptions()
  • SetOptions()
SYSTEM-SUPPLIED PACKAGES: OTHERS
  • COMPRESSION WITH UTL_COMPRESS()
  • LZ_COMPRESS()
  • LZ_UNCOMPRESS()
  • DBMS_DESCRIBE()
  • UTL_MAIL()
  • Set SMTP_OUT_SERVER
  • Calling The Send() Procedure
  • Calling The Send_Attach_xxx() Procedures
  • DBMS_UTILITY()
  • COMPILE_SCHEMA()
  • DB_VERSION()
  • WAIT_ON_PENDING_DML()
ADVANCED INTERFACE METHODS
  • ABOUT EXTERNAL PROCEDURES
  • CALLING JAVA CLASSES
  • CALLING C PROGRAMS
PL/SQL ADVANCED PROGRAMMING & CODING TECHNIQUES
  • AUTONOMOUS TRANSACTIONS
  • USING NOCOPY FOR PARAMETERS
  • CHOOSING THE OPTIMUM DATA TYPE
  • Avoiding Implicit Data type Conversion
  • Choosing Between NUMBER And PLS_INTEGER
  • About PLS_INTEGER
  • Using SIMPLE_INTEGER
  • CHAR Variables Of Different Lengths
  • VARCHAR2 Variables Of Different Lengths
  • CHAR Vs. VARCHAR2
  • CHAR Vs. VARCHAR2 With An Equality Comparison
  • USEFUL PL/SQL CODING TECHNIQUES
  • HANDLING STRING LITERALS
INFLUENCING ORACLE PL/SQL COMPILATION
  • PL/SQL COMPILER OPTIMIZATION
  • PLSQL_OPTIMIZE_LEVEL
  • CONTROLLING COMPILATION MESSAGES
  • PL/SQL NATIVE EXECUTION
DYNAMIC PARTITIONING & PARALLELIZATION
  • ABOUT DYNAMIC PARTITIONING (CHUNKS)
  • CREATING & PROCESSING CHUNKS
  • CREATE_TASK()
  • CREATE_CHUNKS_BY_ROWID()
  • CREATE_CHUNKS_BY_NUMBER_COL()
  • EXECUTE_RUN_TASK()
  • TASK_STATUS()
  • DROP_TASK()
  • MONITORING CHUNK PROCESSING
Course Outline - Volume B

APPLICATION TUNING WITH THE PL/SQL HIERARCHICAL PROFILER
  • WHAT IS THE HIERARCHICAL PROFILER?
  • CONFIGURING THE PROFILER
  • MANAGING PROFILER RUNS
  • ANALYZING PROFILER DATA
  • INTERPRETING THE RESULTS
  • DBMSHP_RUNS
  • DBMSHP_FUNCTION_INFO
  • DBMSHP_PARENT_CHILD_INFO
PL/SQL DEBUGGING WITH DBMS_TRACE()
  • USING THE TRACE FACILITY
  • DBMS_TRACE() TO MANAGE RUNS
  • EXAMINING THE TRACE DATA
  • EVENT_KIND Values
PROTECTING AGAINST SQL INJECTION ATTACKS
  • UNDERSTANDING THE THREAT
  • APPLYING COUNTERMEASURES
IMPLEMENTING VIRTUAL PRIVATE DATABASES
  • UNDERSTANDING VPDS
  • PREPARING FOR A VPD
  • CONFIGURING A VPD
  • MANAGING APPLICATION CONTEXTS
  • Using SYS_CONTEXT()
  • MANAGING POLICIES & SECURITY RULES

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved