Oracle HCM Cloud: Security Certification Training Course Overview

Oracle HCM Cloud Security training communicates about the Oracle HCM Cloud role-based security model. This course mentors supporting us to gain complete experience with the UIs used to manage security in Oracle HCM Cloud. Course Objectives: Identify and manage the different types of roles, together with collective privileges and data, abstract, job, and duty roles. Produce security profiles to restrict data access. Make data roles and assign security profiles to them. Generate role-provisioning rules. Facilitate roles to users. Form implementation users. Use several structures and Form a custom job role and making a custom duty role on the Security Console.

Oracle HCM Cloud: Security (16 Hours) Download Course Contents

Live Virtual Classroom
Group Training 1200 Date On Request
1-on-1 Training (GTR) 1400
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here Hire Our Trainers! Click here

Course Modules

Module 1: Security Overview
  • Role-Based Security Model
  • Predefined HCM Roles
  • Role Inheritance
  • Role Types
  • Security Privileges
  • Role Evaluation
  • Customizing Security for Your Needs
Module 2: Security Profiles and Data Roles
  • Data Security Through Security Profiles
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles Best Practices
  • Key Points for Creating Security Profiles
  • Creating Security Profiles and Assigning to a New Data Role
  • Assigning Security Profiles to Existing Roles
  • Editing Security Profiles
Module 3: User Management
  • User Account Creation Scenarios
  • Maintaining User Accounts
  • Enterprise-Level User-Management Options
  • Managing Applications Security Preferences
  • Implementation Users
  • Reporting on Users
Module 4: Role Provisioning
  • Provisioning Roles to Users: Overview
  • Defining Role-Provisioning Rules
  • Role Mappings in Detail
  • Autoprovisioning
  • Role-Provisioning Rules for Abstract Roles
  • Integration with the New Hire Flow
  • Role-Provisioning Strategies
  • Role Delegation
Module 5: HCM Security Management Data Stores, Tools, Tasks, and Processes
  • HCM Security Management Data Stores
  • HCM Security Tasks
  • Synchronization Processes and Preferences
  • HCM Security Processes
  • The Security Console
Module 6: Using the Security Console
  • Security Console: Overview and Benefits
  • Running the Import User and Role Application Security Data Process
  • Launching the Security Console
  • Using Key Features of the Security Console
  • Role Visualization
  • Role Comparison
  • Security Console Administration Options
Module 7: Creating Custom Roles on the Security Console
  • Creating Custom Job and Abstract Roles
  • Copying Application Roles
  • Transaction Analysis Duty Roles
  • Editing Copied Roles
  • Creating Roles from Scratch
  • Regenerating Data Roles
Module 8: HCM Security Deep Dive
  • Aggregate Privileges and Duty Roles In Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security - Application Role Creation
  • Data Security - FND_GRANTS Generation
  • Data Security - Data Role Creation
  • Data Security in Action
Module 9: Tips for Implementing HCM Security
  • Resilience to Change
  • Minimizing the Number of Data Roles Using Areas of Responsibility
  • Securing by areas of Responsibility
  • Securing Persons Using Custom Criteria
  • Role Optimization
Module 10: Security and HCM Reporting
  • OTBI Security
  • BI Publisher Security
Download Course Contents

Request More Information

Course Prerequisites
  • Basic Computer Knowledge.

By taking this course it imparts learning on how to plan and implement security in Oracle HCM Cloud. To learn some progressive tips for implementing security, using features such as Areas of Obligation to minimize the number of data roles you need to create. By using  the Security Console interface for managing security.