Microsoft Access Networking 2: Maximum Security

Control what users can and can't do in your networked database.
4.6 (34 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
885 students enrolled
$19
$175
89% off
Take This Course
  • Lectures 28
  • Length 2.5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2016 English

Course Description

If you are concerned that network users can, intentionally or by accident, alter or modify settings or code in your networked database, you have come to the right place!  Every single step is covered for maximizing the security of the front end/back end databases from the Network 1 course!   Having installed Access on dozens of networks, I have had to develop methods to prevent users from being anywhere in the system that I don't want them to be.  So why suffer through another phone call for errors that could be completely avoided? I will show you how to eliminate the possibility of them ever happening!

This course shows you how to many techniques for using VBA to control how users log in to and use the database. If you have no familiarity with VBA, you may get frustrated, but every step is illustrated and you are provided with beginning and ending versions of the databases.  For some this could be a quick intro into the incredible power of VBA that will convince them that they really should take the Intro to VBA course.  For others who have already done all or part of that course, 90% these techniques are totally new and will extend the students knowledge of VBA quite a bit.

Most of the employees in my client businesses have small networks staffed with people who know nothing about Access and they don't want to have to figure out how the ribbon and navigator work, that is why they are always hidden.  The systems I build using these techniques let people with zero knowledge of Access get productive on the network quickly.  Believe me, there is a huge and growing need for people who can setup easy to use shared database networks like these and there just aren't enough people who know how to do it right! 

None of this is theory and you won't find these techniques in any book. The content of this course is a breakdown of the methods I successfully use to administer dozens of networks for my client businesses. I learned a long time ago that you have to automate every routine job that you can, but also you must eliminate downtime for your client and yourself by making silly mistakes. These methods of keeping the network users from even seeing anything they do not need to know about just increase productivity and reduce downtime.  

Just take a look at the demo video and see what logging into the finished database looks like.  It doesn't look much like Access!  Many of the employees in my client businesses do not even know they are using Access (and they really don't care).  All they know is it is way easier to get their job done than it used to be! 

Follow along as I take you step by step through the modification of the front and back end databases from the Networking Made Simple course and show you tools that you will be using for years to come! This course will show you :

  1. How to "Encrypt" an Access database.
  2. How to link to encrypted backend databases from the frontend.
  3. The basics of creating a User Login table.
  4. How to create a simple, yet powerful login form.
  5. How to validate passwords and determine the employee security level.
  6. How to develop a secure database without locking yourself out.
  7. How to create a "dialog" login form that cannot be bypassed.
  8. How to hide or unhide the menus and Navigation Pane.
  9. How to set database security properties.
  10. How to create a custom BLANK ribbon!
  11. How to build in a backdoor for Administrators.
  12. How to Password Protect all your VBA Code.
  13. How to Deploy the Updated Database

If you take the time to learn these techniques you will save MANY HOURS of time and avoid wasting time on problems caused by users being where they should not be in the database!

If you want to become the Network Database Guru, click the Take This Course button to get started on this journey to increased productivity and higher value for you in the marketplace. Think of it! In just a few HOURS you know more about securing databases and controlling users on an Access network than almost everyone else!

What are the requirements?

  • Students should have a basic familiarity with Access and a desire to learn more about VBA.

What am I going to get from this course?

  • Secure an Access database so that users do not have the ability to change forms or programs.

What is the target audience?

  • People who have an existing Access database, but want to restrict the ability of users to make changes.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
What we will accomplish in this course
Preview
02:35
Database Download Links
Article
Section 2: Securing the Backend Database
Setup Your Work and Update Environments
Preview
02:01
Add a User Table to the Backend
Preview
04:08
Encrypt the Backend in the Work Folder
Preview
02:40
Relink the Work Frontend to the Secure Backend
Preview
02:50
Section 3: Start Building the Login Form
Create the Login Form
05:08
Add a Password box to the form
03:36
Start Adding VBA Code to the Login Form
08:32
Add an Exit Button to the Login Form
07:21
Start Building the TestEntry function
06:15
Create the LOGIN Button
02:20
Finish Building the TestEntry function
06:30
Add an Exit Button to the Customer Form
08:34
Section 4: Finish the Login Form
Secure the Login form
03:35
Resize the Login Form to Partial Screen
03:17
Create the Startup Routine
06:43
Unhide Menus for ADMIN Users
04:39
Section 5: Set Database Properties
Examine the SetStartupProperties Subroutine
08:21
Create a Macro to Secure the Database
03:28
Setup a Custom Ribbon System Table
04:38
Install the Custom Ribbon and Make Final Changes
07:21
Section 6: Closing the Back Door
The Wide Open Back Door!
03:39
Eliminate the Import Autoexec Problem
06:10
Hide Your Tables!
13:19
Password Protect Your VBA Code
04:30
Section 7: Conclusion
What have we learned?
02:38
BONUS LECTURE: Learn Even More!
Article

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Bruce Myron, Productivity Specialist

Hello, my name is Bruce Myron. I am a self employed Access programmer and general computer consultant to small and medium sized businesses. I got into programming because I was tired of all the jargon most programmers use and how they don't seem to care about business.

"Technology is great but I've always been more interested in how it can be used to make companies more profitable." - Bruce

I live in Portland, Oregon and have many long term relationships with local businesses. Many of the systems I have built for these companies are critical to the success of the business. My specialty is taking the needs of the business and translating them into a system that facilitates, rather than obstructs, what they are trying to do.

I have also spent time as a full time trainer providing group classes on the Microsoft Office programs.

In my opinion the computer industry as a whole is a colossal failure in helping businesses solve their problems. I listen carefully to the needs expressed by my clients and then deliver the simplest, most flexible solution possible.

Over the years I have found that many of the techniques I have used enabled me to survive and thrive when many others have tried the computer programming business and failed.

My goal is to show my students how to create systems that business will value and that will create long term income.

Ready to start learning?
Take This Course