Security Principles Rel 8.96
Starting dates and places
Description
This three-day course provides a thorough understanding of JD Edwards EnterpriseOne features and functionality. Technical implementers, system administrators, and auditors will learn about system architecture, security strategies, best practices, security assessments, web and portal security issues, and the auditing and authorizing features of JD Edwards EnterpriseOne. Upon completion of this course, students will be able to explain and implement an effective JD Edwards EnterpriseOne security model.
Learn to:- Describe JD Edwards EnterpriseOne security architecture
- Identify web security issues
- Describe sign-on security
- Identify security best practices
- Set up security on JD Edwards Enterprise…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
This three-day course provides a thorough understanding of JD Edwards EnterpriseOne features and functionality. Technical implementers, system administrators, and auditors will learn about system architecture, security strategies, best practices, security assessments, web and portal security issues, and the auditing and authorizing features of JD Edwards EnterpriseOne. Upon completion of this course, students will be able to explain and implement an effective JD Edwards EnterpriseOne security model.
Learn to:- Describe JD Edwards EnterpriseOne security architecture
- Identify web security issues
- Describe sign-on security
- Identify security best practices
- Set up security on JD Edwards EnterpriseOne
- Describe JD Edwards EnterpriseOne auditing and authorizing features
Audience
- System Analysts
- Technical Consultant
Course Topics Technology Overview
- Describing JD Edwards EnterpriseOne Security Components
- Describing JD Edwards EnterpriseOne Security Architecture
- Describing LDAP and JD Edwards EnterpriseOne Server Relationships
- Describing Single Sign-On
- Describing Lightweight Directory Access Protocol (LDAP)
- Identifying a Method to Create Security Components
- Explaining How to Put the Components Together
- Describing Security Workbench
- Describing Business Unit Security
- Describing Address Book Data Security
- Using Versions
- Describing Batch Approval / Post Security
- Describing Web-Based Access
- Describing the Portal
- Describing Portal Security
- Describing Security Best Practices
- Changing the JDE Password
- Discussing Auditing and Authorizing
- Describing Oracle Database Auditing
Course Objectives
- Describe JD Edwards EnterpriseOne security principles
- Implement standard security within JD Edwards EnterpriseOne
- Describe the web and object management security issues of JD Edwards EnterpriseOne
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.