Access Mastering Security
Course
Inhouse
Description
-
Type
Course
-
Methodology
Inhouse
Anyone who needs a good understanding in using Security within an Access application and is required to either setup a secure application or administer an already created secure application will benefit from this course.
About this course
Delegates should have a thorough knowledge of Access and have preferably attended the Intermediate and/or Advanced Access Course or have equivalent knowledge.
Reviews
Course programme
Anyone who needs a good understanding in using Security within an Access application and is required to either setup a secure application or administer an already created secure application will benefit from this course.
Prerequisites
- Delegates should have a thorough knowledge of Access and have preferably attended the Intermediate and/or Advanced Access Course or have equivalent knowledge.
Objectives
- Delegates will be able to :
- Understand of the main features of Access Security in order to have the ability to produce safe and secure applications using the appropriate level of security that is required for their particular application.
- Access Level 2 (Delegates should preferably have attended this course or have equivalent knowledge to attend Access Mastering Security.)
- Access Level 3 (Delegates should preferably have attended this course or have equivalent knowledge to attend Access Mastering Security.)
- Bespoke course (a course written to your specific needs) at your company office throughout the UK, at our training venue or at an independent location, convenient to you
- Private course at your company office throughout the UK, at our training room or at an independent location, convenient to you
- Scheduled public course at one of our training venues
- 12 Months telephone and email support
- Comprehensive colour course manual and exercises
- Use of a Modern Training suite with 19 inch flat screen monitors
- 1 delegate per computer
- Lunch (When at our training venue)
- Refreshments (When at our training venue)
- Relaxed refreshment area at our training room
Security overview
- What does secure really mean?
- The differing levels of security
- A way in can always be found
- Review the Access alternatives
- Password protecting your database
- Changing the password
- Removing the password
- Splitting a database into two
- Why have a data and a business tier
- Advantages of a split system
- Disadvantages of a two tier system
- Further enhancements by use of the MDE format
- Controlling what happens when the database opens
- Adding toolbars and menus
- Hiding objects and disabling Access shortcuts
- Introducing the AutoExec macro
- All your hardwork wasted by the shift key
- Disabling the shift key bypass
- Using the AutoKeys macro
- Customising existing menus and toolbars
- Building toolbars
- Building menu bars
- Building shortcut menus
- Assigning bars to reports
- Assigning bars to forms
- Why encrypt?
- Preventing other programs from accessing a database
- Trading off performance against encryption
- User-level security
- Workgroups and workgroup information files
- How permissions work and who can assign them
- Organizing security accounts
- Considerations when organizing security accounts
- Removing user-level security
- Creating and joining a workgroup information file
- Creating new Microsoft Access workgroup information files
- Joining a Microsoft Access workgroup by using the workgroup administrator
- Logging on to a Microsoft Access workgroup
- Turning off the logon dialog box
- Restoring or rebuilding a workgroup information file
- Restoring a damaged or deleted Microsoft Access workgroup information file
- Rebuilding a workgroup information file from user and group names and Ids
- Creating accounts, adding users and printing information
- Creating a security administrator account
- Creating a security user account
- Creating a security group account
- Adding users to security groups
- Printing information about security users and groups
- Deleting accounts and removing users
- Removing users from security groups
- Deleting a security user account
- Deleting a security group account
- Viewing and transfering ownership
- Transfering ownership of an entire database to another administrator
- Using user level security with the front end back end scenario
- Exploring the different types of permissions for user level security
- The developer workgroup solution overview
- Making use of a developer workgroup file
- Safeguarding the developer workgroup file
- Security without usernames and passwords on rollout
Access Mastering Security