Certified CMDB Practitioner

1.00



Foundation Course in Cybersecurity
(Equivalent to ISC2 CC – Certified in Cybersecurity)

Course Description

This is an instructor led training course that will equip participants to manage Java licenses deployed in an organization’s network.

The goal of the course is to be able to develop Jav license practitioners who are experts at understanding and applying Java licensing policies from different publishers in any kind of deployment environment.

You will walk away from this training course understanding how to calculate deployed Oracle licenses, remain compliant and reduce costs for your company.

Java Variants Covered

  • Oracle Java SE
  • Oracle OpenJDK
  • OpenJDK variants
  • Azul Java
  • Bellsoft

Who should attend

  • Software Asset Managers
  • Procurement Managers
  • Datacentre Infrastructure Managers
  • Oracle Middleware Administrators
  • Oracle DBAs
  • Java Developers
  • Oracle License Management Advisors

What is included?

  • Online access to course material for six months

Certification

  • Certified Java Licensing Specialist

Examination

  • Duration: One Hour
  • Format: Online Open Book
  • Style: Multiple-Choice
  • Questions: 40 Based
  • Pass Mark: 75% Or Distinction 90%

Curriculum

  • 6 Sections
  • 31 Lessons
  • 18.5 Hours

The total course can be conducted over 3 full days or 6 half-day sessions.

 

  • Session 1 (1 hour):
    Security Principles
    4

    • 1.1
      Confidentiality, Integrity, and Availability (CIA Triad)

      • Definitions and real-world examples
      • Threats to each component
    • 1.2
      Security Governance

      • Security policies, standards, procedures, guidelines
      • Risk management and threat modeling basics
    • 1.3
      Defense-in-Depth Strategy

      • Layered security concept (physical, network, application, data)
      • Preventive, detective, corrective controls
    • 1.4
      Security Roles & Responsibilities

      • Security vs compliance vs audit
      • Roles: data owner, data custodian, user, security officer
  • Session 2 (2.5 hours):
    Business Continuity (BC) and Disaster Recovery (DR)
    5

    • 1.1
      Business Continuity (BC) and Disaster Recovery (DR)

      • Purpose and scope
      • Business Impact Analysis (BIA)
    • 1.2
      Disaster Recovery Planning (DRP)

      • Types of disasters (natural, technical, human)
      • DR process and testing
    • 1.3
      Recovery Metrics

      • RTO (Recovery Time Objective) and
      • RPO (Recovery Point Objective)
    • 1.4
      Backup Strategies

      • Full, incremental, differential, snapshot backups
      • Off-site, cloud-based backups
    • 1.4
      Disaster Recovery Site Types

      • Hot, Warm, and Cold sites
      • Mobile DR units and cloud DR
  • Session 3 (3 hours):
    Access Controls
    5

    • 1.1
      Identification, Authentication, Authorization, Accounting (IAAA)
    • 1.1
      Authentication Factors

      • Something you know/have/are/do/where you are
      • Examples of each (e.g., passwords, tokens, biometrics)
    • 1.1
      Multi-Factor Authentication (MFA)

      • Use cases and implementation
    • 1.1
      Access Control Models

      • RBAC (Role-Based Access Control)
      • DAC, MAC, ABAC
    • 1.1
      Provisioning and De-provisioning

      • Onboarding and offboarding procedures
      • Least privilege and need-to-know principles
  • Session 4 (3.5 hours):
    Network Security
    7

    • 1.1
      Basic Network Concepts

      • OSI Model basics
      • TCP/IP stack
    • 1.1
      Firewalls

      • Packet filtering, stateful, application proxy
    • 1.1
      Intrusion Detection and Prevention (IDS/IPS)

      • Signature-based vs anomaly-based
    • 1.1
      Virtual Private Networks (VPNs)

      • IPSec vs SSL VPNs
      • Encryption and tunnelling protocols
    • 1.1
      Secure Network Protocols

      • HTTPS, SSH, TLS, SFTP, DNSSEC
    • 1.1
      Wireless Security

      • WPA2/WPA3, 802.1X, rogue APs
    • 1.1
      Segmentation and Zoning

      • VLANs, DMZs, NAC
  • Session 5 (3 hours):
    Security Operations
    5

    • 1.1
      Logging and Monitoring

      • SIEM basics
      • Event vs log vs alert
    • 1.1
      Incident Response (IR)

      • IR Lifecycle: Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
      • Roles and responsibilities during an incident
    • 1.1
      Forensics Basics

      • Chain of custody, preservation of evidence
    • 1.1
      Escalation Procedures

      • Communication channels and incident severity levels
    • 1.1
      Security Awareness

      • User education, phishing simulations, reporting mechanisms
  • Session 6 (2.5 hours):
    Practice Exam & Q&A
    5

    • 1.1
      Sample Questions

      • 30–50 realistic exam-style multiple-choice questions
      • Explanation of correct answers
    • 1.1
      Common Exam Traps

      • Misleading terms, distractors, and “best answer” questions
    • 1.1
      Key Takeaways from Each Domain
    • 1.1
      Exam Preparation Tips

      • Time management, stress reduction, how to approach difficult questions
    • 1.1
      Open Q&A Session

      • Review weak areas and learner queries


Sheshagiri Anegondi
Sheshagiri helps companies reduce Software License & Support costs through deployment optimization and risk management in software license compliance audits. His core skills are Software License Management, Enterprise Software Sales & Sales Management.

Featured Review

Sheshu’s knowledge of Oracle licensing is extremely ood. There may not be anyone else with such deep understanding of how to license Oracle products and manage their contracts. Apart from this, he loves to teach. The combination of these two qualities make this course the best available anywhere in the world.

Reviews

There are no reviews yet.

Be the first to review “Certified CMDB Practitioner”

Title:
Certified CMDB Practitioner

Time:
Sat, Jun 21, 2025 09:00 PM

Timezone:
Asia/Kolkata