How to Secure Oracle WebLogic 12c

A best practices guide to deploying Oracle WebLogic to a producdtion enviornment.
4.1 (12 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
106 students enrolled
Take This Course
  • Lectures 38
  • Length 3.5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2016 English

Course Description

This course introduces the student to some best practices for installing and securing Oracle WebLogic in production environments. There are many differences between Development and Production environments which this course will highlight.

This course is targeted at IT professionals, systems administrators, DevOps engineers, and architects who need to understand and deal with network, information, and application security. The course assumes a beginner to intermediate knowledge of Oracle WebLogic. Prior experience with installation and administration, either hands-on or conceptually is highly recommended.

The course is organized into a series of video lectures followed by a hands-on tutorial. This course comes with a detailed Lab Guide that you can use at home or work.

As an Architect during the day, I am responsible for ensuring that any solutions or services that are deployed to production are architected and deployed in a secure manner. Security is of the utmost importance and it should be yours too.

If you have enterprise deployments of WebLogic in production and you are responsible for how these systems are deployed and secured, then this course will help you understand where to start with securing WebLogic.

Security is a broad and deep topic. This course does not attempt to cover every possible security topic related to WebLogic, however. This course does attempt though to cover what I feel are some of the most important aspects of securing a deployment.

What are the requirements?

  • A server or workstation with elevated priveleges
  • Linux/Unix environments are prefered, but Windows is supported
  • Oracle JDK 1.7 or 1.8 installed
  • WebLogic 12.1.3 Generic Installer downloaded, but NOT installed. We will cover this in the lab.
  • Basic understand of networks and SSL

What am I going to get from this course?

  • Securely install WebLogic
  • Create delegated administrators
  • Define password policies
  • Prevent Denial-of-Service attacks
  • Prevent brute force dictionary attacks
  • Encrypt network traffic using SSL
  • Patch WebLogic
  • Use domain administration ports

Who is the target audience?

  • This course is intended for anyone interested in Weblogic security best practices. This course assumes a basic understanding of Oracle Weblogic with some familiarity with installing and using the administration console.
  • This course is geared mostly toward system administrators, DevOps engineers, and architects.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Welcome to Oracle WebLogic Security

Just an introduction to the course. I'll go over course objectives, ask some questions, and give a brief introduction of my self.


This video will go over the lab guide and how you should use it. This is also where you will download the lab guide.

Section 2: Lecture #1 - Secure Installation

This lecture will discuss how to prepare the OS and environment for a production install of Oracle WebLogic. I will go over the installation process and discuss what components should be removed from WebLogic.


This lab goes over preparing your production environment.


This lab walks through installing WebLogic and removing components not safe for production. 


This lab walks through patching a WebLogic installation.


This lab shows you how to rollback a patch.

Section 3: Lecture #2 - Domain Security

In this lecture you will learn the differences between production and development domain modes. 


This lecture discusses delegated administration and its uses.


This lecture will discuss how to define a password policy using the default password validator.


This lecture will discuss how to configure user login timeouts, retries, and lockouts to prevent brute force and dictionary attacks.


This lecture discusses how to audit security events in WebLogic using the Default Auditing Provider.


Learn how to enable trust between two WebLogic domains using Cross Domain Security.

Lab 2.1 - Create Domains
Lab 2.2 -
Lab 2.3 - Admin Console
Lab 2.4 - Delegated Administration
Lab 2.5 - Password Policy
Lab 2.6 - Auditing
Section 4: Network Security

In this lecture I discuss deploying WebLogic in a multi-tiered network architecture, including using firewalls and access control lists to restrict network traffic in a WebLogic environment. 


Learn how to prevent Denial of Service attacks by setting message size limits and network timeouts. 


In this lecture I discuss how to use connection filters to filter traffic based upon port and protocol.


This lab will show you how to view what ports are open on your system and identify what ports WebLogic has open. 


In this lab you'll learn how to configure a connection filter to restrict network traffic. 

Lab 3.3 - Denial of Service
Section 5: Network Security - SSL/TLS
SSL/TLS Overview

In this lecture I provide an overview of SSL/TLS and get into describing identity and trust as it pertains to WebLogic. 


In this lecture I describe how SSL is configured for WebLogic.


In this lecture I discuss how to debug SSL using JVM flags.


In this short lecture I summarize Network Security. 

Lab 4.1 - Create Identity and Trust
Lab 4.3 Configure Identity and Trust for WebLogic
Lab 4.4 - Configure SSL
Lab 4.5 - Debug SSL
Lab 4.6 - SSL for NodeManager
Lab 4.7 - SSL Protocols and Cipher Suites
Section 6: Administrative Security

In this lecture I discuss how to segregate and protect administrative traffic from non-administrative traffic using dedicated administration ports. 


In this lecture I discuss how to use a secure key to authenticate WLST scripts against WebLogic.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Chris Parent, Cloud Architect, Aspiring Educator, and Geek

Chris has over 15 years of software development, architecture and IT management experience in defense and commercial industries with a focus on enterprise and cloud architectures. He has consulted as an architect and sales consultant with companies such as Lockheed Martin, Northrop Grumman, Raytheon, and Oracle on the implementation and use of Oracle Fusion Middleware products including Oracle WebLogic Server, SOA Suite, and Identity and Access Management. He received his undergraduate and graduate degrees in Computer Science and Systems Engineering from Rensselaer Polytechnic University in Troy, NY and Penn State University respectively. Chris resides with his beautiful family in Denver, Colorado USA.

Ready to start learning?
Take This Course