Access Mastering Security

Course

Inhouse

Price on request

Description

  • Type

    Course

  • Methodology

    Inhouse

Anyone who needs a good understanding in using Security within an Access application and is required to either setup a secure application or administer an already created secure application will benefit from this course.

About this course

Delegates should have a thorough knowledge of Access and have preferably attended the Intermediate and/or Advanced Access Course or have equivalent knowledge.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Course Overview

Anyone who needs a good understanding in using Security within an Access application and is required to either setup a secure application or administer an already created secure application will benefit from this course.
Prerequisites
  • Delegates should have a thorough knowledge of Access and have preferably attended the Intermediate and/or Advanced Access Course or have equivalent knowledge.


Objectives


    Delegates will be able to :
  • Understand of the main features of Access Security in order to have the ability to produce safe and secure applications using the appropriate level of security that is required for their particular application.
Related Courses
  • Access Level 2 (Delegates should preferably have attended this course or have equivalent knowledge to attend Access Mastering Security.)
  • Access Level 3 (Delegates should preferably have attended this course or have equivalent knowledge to attend Access Mastering Security.)
Training Options
  • Bespoke course (a course written to your specific needs) at your company office throughout the UK, at our training venue or at an independent location, convenient to you
  • Private course at your company office throughout the UK, at our training room or at an independent location, convenient to you
  • Scheduled public course at one of our training venues
Whats Included
  • 12 Months telephone and email support
  • Comprehensive colour course manual and exercises
  • Use of a Modern Training suite with 19 inch flat screen monitors
  • 1 delegate per computer
  • Lunch (When at our training venue)
  • Refreshments (When at our training venue)
  • Relaxed refreshment area at our training room
Course Content
Security overview
  • What does secure really mean?
  • The differing levels of security
  • A way in can always be found
  • Review the Access alternatives
Simple password
  • Password protecting your database
  • Changing the password
  • Removing the password
Front end back end
  • Splitting a database into two
  • Why have a data and a business tier
  • Advantages of a split system
  • Disadvantages of a two tier system
  • Further enhancements by use of the MDE format
Start Up Options
  • Controlling what happens when the database opens
  • Adding toolbars and menus
  • Hiding objects and disabling Access shortcuts
  • Introducing the AutoExec macro
  • All your hardwork wasted by the shift key
  • Disabling the shift key bypass
  • Using the AutoKeys macro
Toolbars and menus
  • Customising existing menus and toolbars
  • Building toolbars
  • Building menu bars
  • Building shortcut menus
  • Assigning bars to reports
  • Assigning bars to forms
Encryption
  • Why encrypt?
  • Preventing other programs from accessing a database
  • Trading off performance against encryption
User-level security
  • User-level security
  • Workgroups and workgroup information files
  • How permissions work and who can assign them
  • Organizing security accounts
  • Considerations when organizing security accounts
  • Removing user-level security
Creating, joining and fixing workgroup information files
  • Creating and joining a workgroup information file
  • Creating new Microsoft Access workgroup information files
  • Joining a Microsoft Access workgroup by using the workgroup administrator
  • Logging on to a Microsoft Access workgroup
  • Turning off the logon dialog box
  • Restoring or rebuilding a workgroup information file
  • Restoring a damaged or deleted Microsoft Access workgroup information file
  • Rebuilding a workgroup information file from user and group names and Ids
Managing user and group accounts
  • Creating accounts, adding users and printing information
  • Creating a security administrator account
  • Creating a security user account
  • Creating a security group account
  • Adding users to security groups
  • Printing information about security users and groups
  • Deleting accounts and removing users
  • Removing users from security groups
  • Deleting a security user account
  • Deleting a security group account
  • Viewing and transfering ownership
  • Transfering ownership of an entire database to another administrator
  • Using user level security with the front end back end scenario
Types of permissions
  • Exploring the different types of permissions for user level security
The developer workgroup file solution
  • The developer workgroup solution overview
  • Making use of a developer workgroup file
  • Safeguarding the developer workgroup file
  • Security without usernames and passwords on rollout

Access Mastering Security

Price on request