This course introduces the student to some best practices for installing and securing Oracle WebLogic in production environments. There are many differences between Development and Production environments which this course will highlight.
This course is targeted at IT professionals, systems administrators, DevOps engineers, and architects who need to understand and deal with network, information, and application security. The course assumes a beginner to intermediate knowledge of Oracle WebLogic. Prior experience with installation and administration, either hands-on or conceptually is highly recommended.
The course is organized into a series of video lectures followed by a hands-on tutorial. This course comes with a detailed Lab Guide that you can use at home or work.
As an Architect during the day, I am responsible for ensuring that any solutions or services that are deployed to production are architected and deployed in a secure manner. Security is of the utmost importance and it should be yours too.
If you have enterprise deployments of WebLogic in production and you are responsible for how these systems are deployed and secured, then this course will help you understand where to start with securing WebLogic.
Security is a broad and deep topic. This course does not attempt to cover every possible security topic related to WebLogic, however. This course does attempt though to cover what I feel are some of the most important aspects of securing a deployment.
This lecture will discuss how to prepare the OS and environment for a production install of Oracle WebLogic. I will go over the installation process and discuss what components should be removed from WebLogic.
This lab goes over preparing your production environment.
This lab walks through installing WebLogic and removing components not safe for production.
This lab walks through patching a WebLogic installation.
This lab shows you how to rollback a patch.
In this lecture you will learn the differences between production and development domain modes.
This lecture discusses delegated administration and its uses.
This lecture will discuss how to define a password policy using the default password validator.
This lecture will discuss how to configure user login timeouts, retries, and lockouts to prevent brute force and dictionary attacks.
This lecture discusses how to audit security events in WebLogic using the Default Auditing Provider.
Learn how to enable trust between two WebLogic domains using Cross Domain Security.
In this lecture I discuss deploying WebLogic in a multi-tiered network architecture, including using firewalls and access control lists to restrict network traffic in a WebLogic environment.
Learn how to prevent Denial of Service attacks by setting message size limits and network timeouts.
In this lecture I discuss how to use connection filters to filter traffic based upon port and protocol.
This lab will show you how to view what ports are open on your system and identify what ports WebLogic has open.
In this lab you'll learn how to configure a connection filter to restrict network traffic.
In this lecture I provide an overview of SSL/TLS and get into describing identity and trust as it pertains to WebLogic.
In this lecture I describe how SSL is configured for WebLogic.
In this lecture I discuss how to debug SSL using JVM flags.
In this short lecture I summarize Network Security.
In this lecture I discuss how to segregate and protect administrative traffic from non-administrative traffic using dedicated administration ports.
In this lecture I discuss how to use a secure key to authenticate WLST scripts against WebLogic.
Chris has over 15 years of software development, architecture and IT management experience in defense and commercial industries with a focus on enterprise and cloud architectures. He has consulted as an architect and sales consultant with companies such as Lockheed Martin, Northrop Grumman, Raytheon, and Oracle on the implementation and use of Oracle Fusion Middleware products including Oracle WebLogic Server, SOA Suite, and Identity and Access Management. He received his undergraduate and graduate degrees in Computer Science and Systems Engineering from Rensselaer Polytechnic University in Troy, NY and Penn State University respectively. Chris resides with his beautiful family in Denver, Colorado USA.