HOME > IT & Software > Oracle Apex security fundamentals

Oracle Apex security fundamentals

SynopsisOracle Apex security fundamentals, available at $54.99, has a...
Oracle Apex security fundamentals  No.1

Oracle Apex security fundamentals, available at $54.99, has an average rating of 4.9, with 27 lectures, based on 10 reviews, and has 64 subscribers.

You will learn about Authentication concept Authorization concept how to build custom security application – custom Authentication how to build custom security application – Authorization Schemes how to build custom security application – password encryption methods how to build custom security application – applying Authorization Schemes how to build custom security application -how to avoid the user tricks to violate your security rules Enhancing Security using Oracle DBMS_Crypto Package This course is ideal for individuals who are oracle apex developers It is particularly useful for oracle apex developers.

Enroll now: Oracle Apex security fundamentals

Summary

Title: Oracle Apex security fundamentals

Price: $54.99

Average Rating: 4.9

Number of Lectures: 27

Number of Published Lectures: 26

Number of Curriculum Items: 27

Number of Published Curriculum Objects: 26

Original Price: $64.99

Quality Status: approved

Status: Live

What You Will Learn

  • Authentication concept
  • Authorization concept
  • how to build custom security application – custom Authentication
  • how to build custom security application – Authorization Schemes
  • how to build custom security application – password encryption methods
  • how to build custom security application – applying Authorization Schemes
  • how to build custom security application -how to avoid the user tricks to violate your security rules
  • Enhancing Security using Oracle DBMS_Crypto Package
  • Who Should Attend

  • oracle apex developers
  • Target Audiences

  • oracle apex developers
  • In this program, the student will be able to understand how to build a system for managing the privileges of the application by understanding the concepts of authentication and the concept of authorization and exposure to different types of authentications in addition to identifying the different types of authorization  And learn how to build a page to change the password, as well as build a page for the system administrator to reset the password  .

    In this course, we will be exposed to the oracle dbms_crypto package and study the different methods of data encryption

    Then the course directs the student towards building a custom security system based on the previous concepts

    The course combines theoretical concepts and the practical application of these concepts in the form of a workshop that the student can implement to deepen the benefit of the course.

    The course works in four stages

    The first stage: studying the concepts of confidentiality

    The second stage: apply these concepts by building an  Oracle Apex application

    The third stage is the study of encryption methods

    Fourth stage: building a custom security system

    The course is translated into English for greater use

    In the end, I hope that I have provided good content that benefits APEX users and I will be happy to receive any feedback that enriches this content  the course

    this course conatins the following topics:

    what is authentication

    what is authorization

    -authentication scheme types 1

    -authentication scheme types 2

    -Define authorization schemes 1

    -Define authorization schemes 2

    -change password

    -Reset password

    -Enhancing Security using DBMS_Crypto Package lesson 1

    -Enhancing Security using DBMS_Crypto Package lesson 2

    -Enhancing Security using DBMS_Crypto Package lesson 3

    -Enhancing Security using DBMS_Crypto Package lesson 4

    -Enhancing Security using DBMS_Crypto Package lesson 5

    -Enhancing Security using DBMS_Crypto Package lesson 6

    -Enhancing Security using DBMS_Crypto Package lesson 7

    -Enhancing Security using DBMS_Crypto Package lesson 8

    -creating custom security application –  course scripts

    -creating custom security application lesson 1

    -creating custom security application lesson 2

    -creating custom security application lesson 3

    -creating custom security application lesson 4

    -creating custom security application lesson 5

    -creating custom security application lesson 6

    -creating custom security application lesson 7

    -creating custom security application lesson 8

    -creating custom security application lesson 9

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: what is authentication

    Lecture 2: what is authorization

    Lecture 3: authentication scheme types 1

    Lecture 4: authentication scheme types 2

    Lecture 5: Define authorization schemes 1

    Lecture 6: Define authorization schemes 2

    Lecture 7: change password

    Lecture 8: Reset password

    Lecture 9: Enhancing Security using DBMS_Crypto Package lesson 1

    Lecture 10: Enhancing Security using DBMS_Crypto Package lesson 2

    Lecture 11: Enhancing Security using DBMS_Crypto Package lesson 3

    Lecture 12: Enhancing Security using DBMS_Crypto Package lesson 4

    Lecture 13: Enhancing Security using DBMS_Crypto Package lesson 5

    Lecture 14: Enhancing Security using DBMS_Crypto Package lesson 6

    Lecture 15: Enhancing Security using DBMS_Crypto Package lesson 7

    Lecture 16: Enhancing Security using DBMS_Crypto Package lesson 8

    Lecture 17: creating custom security application – course scripts

    Lecture 18: creating custom security application lesson 1

    Lecture 19: creating custom security application lesson 2

    Lecture 20: creating custom security application lesson 3

    Lecture 21: creating custom security application lesson 4

    Lecture 22: creating custom security application lesson 5

    Lecture 23: creating custom security application lesson 6

    Lecture 24: creating custom security application lesson 7

    Lecture 25: creating custom security application lesson 8

    Lecture 26: creating custom security application lesson 9

    Instructors

  • Oracle Apex security fundamentals  No.2
    Mohsen Sleem
    software development manager
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 0 votes
  • 4 stars: 1 votes
  • 5 stars: 9 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!