e-Learning

Learn at your own pace with anytime, anywhere training.

Classroom Schedule

There are no classes currently scheduled

* Prices Inclusive of taxes

Virtual Schedule

Location Delivered By Language Date Price Action
No schedule date's available now.

* Prices Inclusive of taxes

Private / Corporate Training

Tell us a little about yourself:

Course Description

This IBM Emptoris Contract Management-Security Model (V10.0.1) course covers the important topic of Security. In it, we discuss in detail the two pillars of Contract Management functionality that were deployed together to craft a viable, effective Security system for our training platform.

If the Learning Objectives included in this course description imply the presence of teaching content that interests you, open the course and use the Table of Contents to go directly to the content you require.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

Objectives

Security Overview 

  • What is the Relevance to you of the Training Platform Security Model

 

User Groups and Permission Groups 

After completing this lesson, you should be able to:

  • Describe the role of a User Group.
  • Describe the role of Permissions and Permission Groups.

 

Pillar One: Job Roles, User Groups and Permission Groups

After completing this lesson, you should be able to:

  • Describe the role of Job Roles in our Security System
  • Describe the role of User Groups and Permission Groups vis-a-vis Job Role.

 

Pillar Two: Organization as a Security Vehicle

After completing this lesson, you should be able to:

  • Demonstrate an understanding of the Organizational structure of the version of Contract Management that is used in class.
  • Describe the role and importance of a contract’s Owning Organization.
  • Describe the role and importance of the relative position of a User Id in a Contract Management system’s overall Organization structure.
  • Describe the relationship between Owning Organization and User ID Organizational placement in determining contract visibility.

Audience

This course is designed for Contract Creators.

Prerequisites

N.A

Content

  • Security Overview 
  • User Groups and Permission Groups 
  • Pillar One: Job Roles, User Groups and Permission Groups
  • Pillar Two: Organization as a Security Vehicle

 


For any further queries, feel free to contact the best software training institute in bangalore - Global Knowledge Technologies.