Oracle Cloud Applications: Security Overview - Fudgelearn

Oracle Cloud Applications: Security Overview

Date
Time
Price
5-Dec-2019
3:00 PM GMT - 11:00 PM GMT
£ 1206
Date
Time
Price
Location
Date
Start time
Price
Location
Version title
Price
Oracle Cloud Applications: Security Overview
£ 1066

In this seminar course, you'll learn about the Oracle Applications Cloud security components providing security to the Oracle Cloud Applications. The discussion includes common security components, components unique to three of the offerings (Human Capital Management, Enterprise Resource Planning, and Sales Cloud). Other content introduces the Security Console, discusses enterprise setup and the role of Functional Setup Manager, and the identity and uses of bulk data loading tools for different offerings.

Learn To:

  • Describe RBAC and how it is used to provide users access to applications and data.
  • Identify Security Console uses for role research and customization, user management, and security setup.
  • Identify the different types of roles and explain how they are used to create a role hierarchy.
  • Identify bulk data load capabilities for separate Oracle Cloud Application offerings and their uses.
  • Provide detail on the security implementation in Human Capital Management, Enterprise Resource Planning, and Sales Cloud.
  • Identify how role customization and user management is done in the Security Console.

Benefits to You

Taking this course will help you understand the security requirements and implementation needs for the Oracle Cloud Applications. Experienced instructors will explain how security needs are met through the Enterprise Setup, Oracle provided Security Reference Model, and customized roles created by the cloud customer as needed.

Security Overview

You'll be introduced to the different types of roles Oracle uses to create the RBAC security for Oracle Cloud Applications. Included in this overview is the introduction of the Functional Setup Manager and the Security Console.

Security Components

Instructors will explain that, in addition to the licensed offering on the cloud, there will be four other application components installed for enterprise and security implementation. These components include the Functional Setup Manager and the Security Console.

Role Provisioning to users

You'll learn that there are multiple parts to role provisioning. Some of these components are common and stretch across offering boundaries while each offering also has security components that are unique to that offering. These components cover both custom role creation and role provisioning to users.

This is seminar course, covering 2 days worth of content. A seminar course does not provide for user participation in lab exercises. Rather, the instructor will augment the course presentation with real world demonstrations on an Oracle Cloud environment. These scripted demonstrations are provided to the attendees in the class in the form on an activity guide. The attendees will not perform the demonstrations as labs.

  • Administrator
  • Cloud Administrator
  • Implementer
  • Manager
  • Identify security components in Oracle Cloud Applications
  • Identify required security components used in Oracle Cloud Applications
  • Introduce the Functional Setup Manager
  • Introduce and provide useage details of the Security Console
  • Describe Enterprise setup and its importance to Cloud Applications security
  • Introduce Oracle bulk data loaders
  • Demonstrate using the Security Console for role research and customization
  • Provide details of the Security Console for user management
  • Describe the role hierarchy and how it provides application and data access
  • Describes the types of users supported by Oracle Cloud Applications
  • Security Overview
    • Roles Based Access Control terminology
    • Security implementation data flow
    • Role Based Access Control Standard definition
    • Functional Setup Manager introduction
    • Role Inheritance Hierarchy introduction
  • Security Components
    • Required installation components in addition to licensed offering
    • Security Console introduction
    • Human Capital Management Core description and requirement
    • Introduce the Oracle Security Reference Model
  • Functional Setup Manager
    • Identify user types and need
    • List implementation user duties
    • Describe implementation user creation and provisioning
    • Describe functional user creation and provisioning
    • Introduct implementation projects
  • Enterprise Setup
  • Role Types and Role Provisioning
    • Introduce the five types of roles supported
    • Provide details on the role inheritance hierarchy
    • Describe Role Provision Rules and demonstrate their use
  • Security Console
    • Describe the data storage for the Security Console
    • List the benefits and features of the Security Console
    • Describe Security Console role management capabilities
    • Describe Security Console user management capabilities
    • Describe Security Console setup requirements
  • User and Role Provisioning
    • Describe user account creation capabilities
    • Identify role provisioning capabilities
    • Identify role provisioning restrictions
    • Introduce the HCM Data Loader
    • Provide details on HCM Role customization
    • Provide details on ERP Role customization
    • Provide details on Sales Cloud Role customization
Need help finding the right course

Having problem finding the course you’re looking for? Get in touch.

£ 1206
2 Days
Online
1 Event available
£ 1066
2 Days
Train online via an Internet connection, 24/7
1 Event available
Share this Course
Get in touch
If you would like to find out how we can help you, please get in touch
Book a meeting
We offer free consultation if you’re keen to find out what course fits the best for you. Use the link below to schedule a meeting with us.
Print
Use the links below to print the details.
Convince your boss

Oracle Cloud Applications: Security Overview

Course Overview

In this seminar course, you'll learn about the Oracle Applications Cloud security components providing security to the Oracle Cloud Applications. The discussion includes common security components, components unique to three of the offerings (Human Capital Management, Enterprise Resource Planning, and Sales Cloud). Other content introduces the Security Console, discusses enterprise setup and the role of Functional Setup Manager, and the identity and uses of bulk data loading tools for different offerings.

Learn To:

  • Describe RBAC and how it is used to provide users access to applications and data.
  • Identify Security Console uses for role research and customization, user management, and security setup.
  • Identify the different types of roles and explain how they are used to create a role hierarchy.
  • Identify bulk data load capabilities for separate Oracle Cloud Application offerings and their uses.
  • Provide detail on the security implementation in Human Capital Management, Enterprise Resource Planning, and Sales Cloud.
  • Identify how role customization and user management is done in the Security Console.

Benefits to You

Taking this course will help you understand the security requirements and implementation needs for the Oracle Cloud Applications. Experienced instructors will explain how security needs are met through the Enterprise Setup, Oracle provided Security Reference Model, and customized roles created by the cloud customer as needed.

Security Overview

You'll be introduced to the different types of roles Oracle uses to create the RBAC security for Oracle Cloud Applications. Included in this overview is the introduction of the Functional Setup Manager and the Security Console.

Security Components

Instructors will explain that, in addition to the licensed offering on the cloud, there will be four other application components installed for enterprise and security implementation. These components include the Functional Setup Manager and the Security Console.

Role Provisioning to users

You'll learn that there are multiple parts to role provisioning. Some of these components are common and stretch across offering boundaries while each offering also has security components that are unique to that offering. These components cover both custom role creation and role provisioning to users.

This is seminar course, covering 2 days worth of content. A seminar course does not provide for user participation in lab exercises. Rather, the instructor will augment the course presentation with real world demonstrations on an Oracle Cloud environment. These scripted demonstrations are provided to the attendees in the class in the form on an activity guide. The attendees will not perform the demonstrations as labs.

Virtual Class
2 Days
Date
Start time
Price
Location
5-Dec-2019
3:00 PM GMT
£ 1206
Online
Training on Demand
2 Days
Date
Start time
Price
Location
Available On Demand
£ 1066
Audience
  • Administrator
  • Cloud Administrator
  • Implementer
  • Manager
Objectives
  • Identify security components in Oracle Cloud Applications
  • Identify required security components used in Oracle Cloud Applications
  • Introduce the Functional Setup Manager
  • Introduce and provide useage details of the Security Console
  • Describe Enterprise setup and its importance to Cloud Applications security
  • Introduce Oracle bulk data loaders
  • Demonstrate using the Security Console for role research and customization
  • Provide details of the Security Console for user management
  • Describe the role hierarchy and how it provides application and data access
  • Describes the types of users supported by Oracle Cloud Applications
Topics
  • Security Overview
    • Roles Based Access Control terminology
    • Security implementation data flow
    • Role Based Access Control Standard definition
    • Functional Setup Manager introduction
    • Role Inheritance Hierarchy introduction
  • Security Components
    • Required installation components in addition to licensed offering
    • Security Console introduction
    • Human Capital Management Core description and requirement
    • Introduce the Oracle Security Reference Model
  • Functional Setup Manager
    • Identify user types and need
    • List implementation user duties
    • Describe implementation user creation and provisioning
    • Describe functional user creation and provisioning
    • Introduct implementation projects
  • Enterprise Setup
  • Role Types and Role Provisioning
    • Introduce the five types of roles supported
    • Provide details on the role inheritance hierarchy
    • Describe Role Provision Rules and demonstrate their use
  • Security Console
    • Describe the data storage for the Security Console
    • List the benefits and features of the Security Console
    • Describe Security Console role management capabilities
    • Describe Security Console user management capabilities
    • Describe Security Console setup requirements
  • User and Role Provisioning
    • Describe user account creation capabilities
    • Identify role provisioning capabilities
    • Identify role provisioning restrictions
    • Introduce the HCM Data Loader
    • Provide details on HCM Role customization
    • Provide details on ERP Role customization
    • Provide details on Sales Cloud Role customization