1: Introduction to Oracle CX Cloud Security Framework
1.1 Overview of Security in Oracle CX Cloud CRM
1.2 Understanding the Oracle CX Cloud Security Architecture
1.3 Key Components: Users, Roles, and Permissions
1.4 Setting Up the Training Environment
1.5 Hands-on Exercise: Exploring the Security Console in Oracle CX Cloud
2: User Management and Authentication
2.1 Managing User Accounts in Oracle CX Cloud
2.2 Configuring Single Sign-On (SSO) and Multi-Factor Authentication (MFA)
2.3 User Provisioning and Deprovisioning Processes
2.4 Best Practices for User Authentication and Password Policies
2.5 Hands-on Exercise: Implementing SSO and MFA in Oracle CX Cloud
3: Role-Based Access Control (RBAC) in Oracle CX Cloud
3.1 Understanding Role-Based Access Control (RBAC) Principles
3.2 Overview of Standard Roles in Oracle CX Cloud
3.3 Creating and Managing Custom Roles
3.4 Assigning Roles and Permissions to Users
3.5 Hands-on Exercise: Configuring Custom Roles and Assigning Permissions
4: Advanced Role Customization
4.1 Customizing Roles to Meet Specific Business Requirements
4.2 Implementing Hierarchical Roles and Role Inheritance
4.3 Best Practices for Role Segregation and Minimizing Overlap
4.4 Managing Role-Based Access Across Multiple Oracle CX Modules
4.5 Hands-on Exercise: Developing and Testing Complex Role Configurations
5: Configuring Permissions and Access Controls
5.1 Understanding Permission Sets and Their Impact on Data Access
5.2 Configuring Fine-Grained Permissions for Specific Modules
5.3 Setting Up Object-Level and Field-Level Security
5.4 Implementing Data Masking and Redaction for Sensitive Information
5.5 Hands-on Exercise: Configuring and Testing Permissions in Oracle CX
6: Security Policies and Compliance Management
6.1 Overview of Security Policies in Oracle CX Cloud
6.2 Configuring Security Policies for Data Access and Protection
6.3 Ensuring Compliance with GDPR, CCPA, and Other Regulations
6.4 Implementing Data Retention and Disposal Policies
6.5 Hands-on Exercise: Setting Up and Enforcing Security Policies
7: Auditing and Monitoring Security in Oracle CX Cloud
7.1 Introduction to Security Auditing Features in Oracle CX Cloud
7.2 Configuring Audit Trails and Activity Logs
7.3 Monitoring User Activity and Access Patterns
7.4 Detecting and Responding to Security Incidents
7.5 Hands-on Exercise: Configuring Auditing and Monitoring Tools
8: Managing Security in Multi-Tenant Environments
8.1 Understanding Multi-Tenancy in Oracle CX Cloud
8.2 Best Practices for Managing Security in Multi-Tenant Setups
8.3 Configuring Tenant-Level Security Settings
8.4 Managing Cross-Tenant Data Access and Security
8.5 Hands-on Exercise: Securing a Multi-Tenant Oracle CX Environment
9: Advanced Security Scenarios and Troubleshooting
9.1 Implementing Security for Integrations and APIs
9.2 Managing Security for Mobile Access to Oracle CX Cloud(Ref: Building Mobile-First Applications with Power Apps)
9.3 Troubleshooting Common Security Issues in Oracle CX
9.4 Best Practices for Continuous Security Improvement
9.5 Hands-on Exercise: Addressing Advanced Security Scenarios
10: Capstone Project: Designing a Comprehensive Security Model
10.1 Project Overview: Developing a Security Model for an Oracle CX Implementation
10.2 Defining Security Requirements Based on Business Needs
10.3 Configuring Roles, Permissions, and Policies
10.4 Implementing Auditing, Monitoring, and Compliance Measures
10.5 Hands-on Exercise: Developing and Presenting the Capstone Security Project
11: Security Certification Preparation and Best Practices
11.1 Preparing for Oracle CX Cloud Security Certification Exams
11.2 Review of Key Security Concepts and Best Practices
11.3 Study Tips and Resources for Certification
11.4 Exploring Further Learning Opportunities in Oracle Cloud Security
11.5 Course Wrap-Up and Feedback
11.6 Final Q&A and Course Completion
Reviews
There are no reviews yet.