• phone icon +44 7459 302492 email message icon info@uplatz.com
  • Register
0- - 0
Job Meter = High

Oracle Cloud Applications: Security Overview

30 Hours
Online Instructor-led Training
USD 2800
Oracle Cloud Applications: Security Overview course and certification
318 Learners

About this Course

In this seminar course, you'll learn about the Oracle Applications Cloud security components providing security to the Oracle Cloud Applications. The discussion includes common security components, components unique to three of the offerings (Human Capital Management, Enterprise Resource Planning, and Sales Cloud). Other content introduces the Security Console, discusses enterprise setup and the role of Functional Setup Manager, and the identity and uses of bulk data loading tools for different offerings.

Course Objective

  • Identify security components in Oracle Cloud Applications
  • Identify required security components used in Oracle Cloud Applications
  • Introduce the Functional Setup Manager
  • Introduce and provide useage details of the Security Console
  • Describe Enterprise setup and its importance to Cloud Applications security
  • Introduce Oracle bulk data loaders
  • Demonstrate using the Security Console for role research and customization
  • Provide details of the Security Console for user management
  • Describe the role hierarchy and how it provides application and data access
  • Describes the types of users supported by Oracle Cloud Applications
Target Audience

  • Administrator
  • Cloud Administrator
  • Implementer
  • Manager

Oracle Cloud Applications: Security Overview

Course Details & Curriculum
  • Security Overview
    • Roles Based Access Control terminology
    • Security implementation data flow
    • Role Based Access Control Standard definition
    • Functional Setup Manager introduction
    • Role Inheritance Hierarchy introduction
  • Security Components
    • Required installation components in addition to licensed offering
    • Security Console introduction
    • Human Capital Management Core description and requirement
    • Introduce the Oracle Security Reference Model
  • Functional Setup Manager
    • Identify user types and need
    • List implementation user duties
    • Describe implementation user creation and provisioning
    • Describe functional user creation and provisioning
    • Introduct implementation projects
  • Enterprise Setup
  • Role Types and Role Provisioning
    • Introduce the five types of roles supported
    • Provide details on the role inheritance hierarchy
    • Describe Role Provision Rules and demonstrate their use
  • Security Console
    • Describe the data storage for the Security Console
    • List the benefits and features of the Security Console
    • Describe Security Console role management capabilities
    • Describe Security Console user management capabilities
    • Describe Security Console setup requirements
  • User and Role Provisioning
    • Describe user account creation capabilities
    • Identify role provisioning capabilities
    • Identify role provisioning restrictions
    • Introduce the HCM Data Loader
    • Provide details on HCM Role customization
    • Provide details on ERP Role customization
    • Provide details on Sales Cloud Role customization

Didn't find what you are looking for?  Contact Us