Oracle11g: Advanced PL/SQL |
| [ ] |
Introduction |
| [ ] |
Introduction to PL/SQL |
PL/SQL Programming Concepts: Review |
| [ ] |
List restrictions on calling functions from SQL expressions |
| [ ] |
Hand exceptions |
| [ ] |
Manage dependencies |
| [ ] |
Use Oracle-supplied packages |
Designing PL/SQL Code |
| [ ] |
Identify guidelines for cursor design |
| [ ] |
Use cursor variables |
| [ ] |
Create subtypes based on existing types |
Working with Collections |
| [ ] |
Create collections (nested table, array and associative arrays, PL SQL tables) |
| [ ] |
Use collections methods |
| [ ] |
Manipulate collections |
| [ ] |
Distinguish between the different types of collections and their uses |
Using Advanced Interface Methods |
| [ ] |
Execute external C programs from PL/SQL |
| [ ] |
Execute Java programs from PL/SQL |
|
Implementing Fine-Grained Access Control for VPD |
| [ ] |
Explain the process of fine-grained access control |
| [ ] |
Implement and test fine-grained access control |
Manipulating Large Objects |
| [ ] |
Create and manage LOB data types |
| [ ] |
Use the DBMS_LOB PL/SQL package |
| [ ] |
Use of temporary LOBs |
Administering SecureFile LOBs |
| [ ] |
Describe SecureFile LOB features |
| [ ] |
Enable SecureFile LOB deduplication, compression, and encryption |
| [ ] |
Migrate BasicFile LOBs to the SecureFile LOB format |
Performance and Tuning |
| [ ] |
Use native and interpreted compilation methods |
| [ ] |
Tune PL/SQL code |
| [ ] |
Enable intraunit inlining |
|
Improving Performance with Caching |
| [ ] |
Improve memory usage by caching SQL result sets and using the DBMS_RESULT_CACHE package |
| [ ] |
Write queries that use the result cache hint |
| [ ] |
Set up PL/SQL functions to use PL/SQL result caching |
Analyzing PL/SQL Code |
| [ ] |
Run reports on source code |
| [ ] |
Determine identifier types and usages |
| [ ] |
Use DBMS_METADATA to retrieve object definitions |
Profiling and Tracing PL/SQL Code |
| [ ] |
Trace PL/SQL program execution |
| [ ] |
Profile PL/SQL applications |
Safeguarding Your Code Against SQL Injection Attacks |
| [ ] |
Describe SQL injections |
| [ ] |
Reduce attack surfaces |
| [ ] |
Use DBMS_ASSERT |
| [ ] |
Design immune code |
| [ ] |
Test code for SQL injection flaws |
|