-
Security Class Videos
18 Lessons -
-
Rising Sessions
12 Lessons -
-
Next Level Presentation Docs
7 Lessons
Remote Placement and Job Support
Workday Certification Assistance
Implementation of real-time projects
24*7 Support
Who is this course for?
Job Positions To Apply
1. Workday Security Consultant
2. Workday Security Analyst
3. Workday Security Administrator
4. Workday Functional Security Lead
5. Workday Functional Consultant
6. Workday Analyst
7. Workday Solutions Lead
8. Workday Business Process Admin
9. Workday Administrator
10. Workday Consultant
Payment Options
Zelle: workdayboa@gmail.com
Workday Security Training is the most progressive training which is structured to enhance the student's functioning skills and knowledge. If your desire is to turn as a Workday functional consultant, then you are in exact place. The training module is all-inclusive with recent possibilities which results in realistic benefits to the ambitious Workday professionals. Our in-depth training models self-assures the students to excels in the job opportunities by effortlessly clearing interviews. Besides the fundamentals, requirements and the establishment of the Workday Security module, the training excels to the update form of Security, molding a student in to a top-notch Workday Security expert by the course conclusion.
You can create authentication policies that determine how users can access your Workday tenant. When defining an authentication policy, consider:
• Workday environments for which you’re creating the authentication policy.
• Networks and IP addresses from which you want to block all users.
• Networks and IP addresses for which you want to enable access to users.
• Methods you want to require users to authenticate with, and if you want to require multifactor authentication for users.
• Functionality to which you want to restrict users after they authenticate.
Workday configurable security enables you to control the items users can view and the actions they can perform in your tenant. You can determine how you want to group users through security groups. You can specify the items and actions that members of security groups can view and perform through security policies.
Security policies enable you to configure access to groups of items and individual business process actions. By associating security groups with security policies, you can enable members of the security groups to access the secured items and actions. Workday delivers these types of security policies:
• Domain security policies, which secure reports, tasks, and integrations.
• Business process security policies, which secure business processes.
Workday provides several security domains that secure access to integration templates and integration systems. These domains separate the permissions to configure an integration from the permissions to run an integration and view integration output.
You can mask sensitive data in your tenant. Example: For identity theft protection. You can mask data by:
• User account.
• Security group.
• Files uploaded before a selected date and time.
• Automate permission assignments by grouping users based on similar attributes, saving you the effort of setting up permissions individually.
• Manage access to integrations, reports, mobile devices, and IT access using a single security model, making it easier to maintain access at scale.
• Make mass changes to your security configuration as your organization grows.
• Automatically add new users to a defined security group based on their position, such as adding financial analysts to a security group when hired.
• Enable users to access only non-sensitive portions of data, such as enabling HR administrators to access aggregated payroll results.
• Provide different levels of access for different types of users in the same tenant.
This Workday Training is designed to give you a comprehensive understanding of Workday security, enabling you to apply these skills in real-world scenarios.
About Instructor
Mary is a global Workday ERP implementation expert, speaker, trainer, program manager, associate partner, and transformational leader from Dallas, Texas. She possesses expertise in various areas, including implementation, Hyper-Care, data conversion, integrations, change management, project management, and testing. Her unique approach sets her apart in the industry, with no direct competitors. Notably, she is not just a trainer but a seasoned implementer, having mentored over 50,000 students worldwide and providing practical insights for securing jobs.
Mary is a seasoned professional with extensive expertise in PeopleSoft, Oracle, and Workday. Her career spans roles as an implementer, solution architect, and design expert, and she has also taken the lead in organizing conferences worldwide and collaborating with major clients from the top five global firms. Mary's knowledge and proficiency in these ERP systems reflect her veteran-level experience in the field. In addition to her expertise, Mary is a collaborative partner, working alongside a range of implementers. This includes but is not limited to, renowned firms such as IBM, Accenture, Alight, KPMG, and PWC. Mary's training seems to replicate her skills, providing a unique learning opportunity.
The training is specifically tailored for roles in Mary's ongoing projects, eliminating the need for students to seek employment elsewhere. Mary transcends the typical trainer role by providing continuous support due to her involvement in ongoing global projects. She is a partner and also the owner of million-dollar global projects. Leveraging her profound 30 years of expertise, Mary strongly emphasis quality and quantity within her comprehensive training initiatives. She showcases an array of extensive projects that not only furnish participants with real-time experience but also open avenues for remote work opportunities and direct client engagement, all streamlined without the requirement for traditional interviews. Mary particularly ensures great prospects in challenging modules.
Mary's mentoring extends beyond technical skills, fostering all-encompassing professional and personal development. Participants in her training become well-rounded professionals without any prerequisites because of Mary's practical and professional approach. As a seasoned ERP professional, she invites individuals to join her comprehensive Workday training program, covering all Workday modules with hands-on, real-time experience and certification. The globally accessible course ensures remote placements tailored to participants time zones.
Reviews
4.5
Top Rated
Hanna Green
A Transformational Training Experience
The Workday Security Training program was a worthwhile investment. The comprehensive content, knowledgeable instructor, hands-on exercises, and interactive elements all contributed to an effective and engaging learning experience. I feel equipped with the necessary skills and knowledge to confidently manage Workday security in my role. I highly recommend this training program to anyone seeking to enhance their Workday security expertise.
Hannan Wilson
Excellent Trainer
I was interested in Workday Security module and been searching for a reliable and knowledgeable trainer ever since. After a through search i have found Mary and was happy to get knowledge and guidance under her. She not only explains the modules in a real time scenario but also motivates individuals to strive for success and have a positive approach which many trainers lack now a days. I have got overall knowledge through out the course and the material provided by her and also the guidance provided by her, which helped the most in cracking the interview which was my main concern. I thankul to mary for her constant guidance and encouragement to strive success that fuelled me to get what i want in my career.
Rate this course