Training Course
Syllabus:
Microsoft® Access® Database Security
Webinar
1-Hour CareerTrack Webinar
Demoed in Access 2007
Microsoft Access is one of today's most powerful database software applications
— which might be why it can certainly seem intimidating. Because it houses many
organizations' most essential (and often confidential!) data, security is one of
the top priorities for a host of users. Are you confident that your data is safe
and secure, yet still easily accessible for those who need to manipulate and
retrieve it?
The real power of Access lies in the ease of use with which you can build,
organize, and share databases. However, because these functions can be done with
just a few mouse clicks or keyboard strokes, unprotected data can be highly
vulnerable. Just as quickly as you create a systematic, organized repository for
your data, you could lose everything you've worked so diligently to build.
In earlier versions of Access, security was often viewed as too complex for most
users to understand or implement. With the improvements made over time, the
powerful security architecture has become more straightforward. Features such as
the Trust Center and Security Wizard allow users to make decisions about the
accessibility of information in your database. Whether you are working with
sales information, customer records, employee stats, contact information,
product inventory, direct mail results, or other valuable data, it's imperative
that your information be as protected as it is organized. From there, you can
determine who is authorized to input, manipulate, and view data at a shared
level or even a user level.
Could your organization benefit from a
pre-defined system of accessibility to your Access databases? Would you like to
…
- Recognize what code is potentially unsafe, and simplify the process of
trusting your content?
- Integrate macros that streamline the reporting process?
- Combine database passwords and encoding into a streamlined encryption
process?
- Package, sign, and distribute an Access database?
- Open and view data without having to decide whether you should enable the
contents of a database?
- Determine if components of your database require workgroup security, and
which should be defined at a user level?
- Implement navigation pane protection measures to hide important objects
from users?
With the simplified security measures in Access 2007/2010, you
can do all of this and much more! Don't spend another day worried that your data
and objects in your database are unprotected. With this power-packed program,
you'll learn insider secrets, savvy shortcuts, and pro users' tips for securing
your databases, simplifying and implementing appropriate permissions, and
protecting your organization's intellectual property.
This one-hour webinar will offer you real solutions to your database security
dilemmas that can be implemented immediately after the program ends. From
administering passwords to safely deploying databases, you'll quickly be able to
gain control over your company's critical data while providing users customized
access to only the information they need. Don't let your data remain vulnerable
for another day!
After just one hour with our Access expert, you'll walk away with the tools
and techniques necessary to:
-
Enable executable content in your databases, either for a
single session or long term
-
Utilize the Trust Center to identify trusted publishers and
locations for streamlining your ability to open and utilize databases
-
Provide a simpler user interface for identified individuals by
hiding objects and/or manipulating the navigation pane
-
Set User and Group permissions to reflect the appropriate
access for viewing and manipulating data among users in your organization
-
Encrypt databases, and add and administer passwords
-
Create self-signed certificates and signed packages to collect
and deploy your databases
-
And more!
Who will
benefit?
Managers, supervisors, team
leaders, IT professionals, analysts, financial professionals, small business
owners — anyone and everyone who uses Microsoft Access and is looking to ensure
their organization's critical information is properly protected!
Don't wait to sign up for this information-packed hour! Discover the
simplicity of Access' improved and advanced security features, and begin putting
them to work for you today. Ensure that your organization's data is protected
from potentially harmful sources — and access is regulated to appropriate users.
WEBINAR Start Time:
1-Hour CareerTrack Webinar
2 pm Eastern
1 pm Central
12 pm Mountain
11 am Pacific
10 am Alaskan
9 am Hawaiian
Webinar
and CD (Save
$150!) - US $248
Webinar Only
- US $199
Webinar CD
Only - US $199
Q&A Session
Immediately following the Webinar, the phone line
will be opened up to conference participants who wish to submit questions to our
speaker, time permitting. |