Course Features 
WORKDAY HCM TRAINING


Remote Placement and Job Support


Workday Certification Assistance


Implementation of real-time projects


24*7 Support

Highlights

  1. Only institute to provide training in all Workday modules 
  2. Remote Job Placement across 40+ countries (US, UK, India, etc)  
  3. Priceless downloadable documents (PDF, PPT, Visio's, DOC) 
  4. Workday Tenant and Curriculum Access  
  5. Hands-on support from Mary who is not a hired trainer  
  6. 200+ Real-world projects, examples, and case studies    
  7. Sample resumes for every Workday job Interview preparation, and Job Support   
  8. 10 years of real-time Workday live project experience   
  9. Cheat sheets with step-by-step guides are provided  
  10. Workday Certification will be provided by partners/clients

What you will learn

  1. Learn the Basics, foundation, and essentials of Workday framework
  2. In-depth  Authentication, Configurable Security, Security for Integrations and Data Privacy concepts
  3. Security Basics, Groups,  Policies, Change control in detail
  4. Design and configure in Workday in addition to end-user training
  5. Method of placement: Internal client projects, External vendors, Direct  full time client or partner referrals
  6. Workday Certification assistance and referral for immediate certification
  7. Take your career to the next level!
  8. After this course, you will have the skills to start a successful career in Workday Security, Testing and Project Management

Who is this course for?

  1. Absolutely no experience is required. We will start from the basics and gradually build up your knowledge. Everything is in the course.
  2. People who want a successful career in Workday.
  3. Anyone who wants to become Workday consultant with practical skills of Workday implementation.
  4. People who are ambitious and want to learn faster than their peers.

Job Positions To Apply 

1. Workday Security Consultant
2. Workday Security Analyst
3. Workday Security Administrator
4. Workday Functional Security Lead
5. Workday Functional Consultant

6. Workday Analyst
7. Workday Solutions Lead
8. Workday Business Process Admin
9. Workday Administrator  
10. Workday Consultant

Buy Your Course

Workday Security Training
<<< 99% OFF!! >>>

$1,500 
Now $399 only!

  • Downloadable Documents
  • Cheat sheets for classes 
  • Tenant Access
  • Real-time project experience
  • Job Support
  • No Refund Policy

Payment Options

Zelle: workdayboa@gmail.com

Course Summary

Introduction

Workday Security Training is the most progressive training which is structured to enhance the student's functioning skills and knowledge. If your desire is  to turn as a Workday functional consultant, then you are in exact place. The training module is all-inclusive  with recent possibilities which results in realistic benefits to the ambitious Workday professionals. Our in-depth training models self-assures the students to excels in the job opportunities by effortlessly clearing interviews. Besides the fundamentals, requirements and the establishment of the Workday Security module, the training excels to the update form of Security, molding a student in to a top-notch Workday Security expert by the course conclusion.
Authentication Policies

You can create authentication policies that determine how users can access your Workday tenant. When defining an authentication policy, consider:
        • Workday environments for which you’re creating the authentication policy.  
        • Networks and IP addresses from which you want to block all users.
        • Networks and IP addresses for which you want to enable access to users.
        • Methods you want to require users to authenticate with, and if you want to require multifactor authentication for users.
        • Functionality to which you want to restrict users after they authenticate. 
Workday Configurable Security
 
Workday configurable security enables you to control the items users can view and the actions they can perform in your tenant. You can determine how you want to group users through security groups. You can specify the items and actions that members of security groups can view and perform through security policies.

Security Policies

Security policies enable you to configure access to groups of items and individual business process actions. By associating security groups with security policies, you can enable members of the security groups to access the secured items and actions. Workday delivers these types of security policies:
      • Domain security policies, which secure reports, tasks, and integrations.
      • Business process security policies, which secure business processes. 

Security for Integrations

 Workday provides several security domains that secure access to integration templates and integration systems. These domains separate the permissions to configure an integration from the permissions to run an integration and view integration output.
 

Data Masking

You can mask sensitive data in your tenant. Example: For identity theft protection. You can mask data by:
    • User account.
    • Security group.
    • Files uploaded before a selected date and time. 
 

Business Benefits

    • Automate permission assignments by grouping users based on similar attributes, saving you the effort of setting up permissions individually.
    • Manage access to integrations, reports, mobile devices, and IT access using a single security model, making it easier to maintain access at scale.
    • Make mass changes to your security configuration as your organization grows. 
     

Use Cases

   • Automatically add new users to a defined security group based on their position, such as adding financial analysts to a security group when hired.
   • Enable users to access only non-sensitive portions of data, such as enabling HR administrators to access aggregated payroll results.
   • Provide different levels of access for different types of users in the same tenant. 

    Course Curriculum

    Reviews

    4.5

    Top Rated
    • 5 50%
    • 4 50%
    • 3
    • 2
    • 1
    Hanna Green

    A Transformational Training Experience

    The Workday Security Training program was a worthwhile investment. The comprehensive content, knowledgeable instructor, hands-on exercises, and interactive elements all contributed to an effective and engaging learning experience. I feel equipped with the necessary skills and knowledge to confidently manage Workday security in my role. I highly recommend this training program to anyone seeking to enhance their Workday security expertise.

    8 months ago
    Jeff Williams

    Excellent Trainer

    I was interested in Workday Security module and been searching for a reliable and knowledgeable trainer ever since. After a through search i have found Mary and was happy to get knowledge and guidance under her. She not only explains the modules in a real time scenario but also motivates individuals to strive for success and have a positive approach which many trainers lack now a days. I have got overall knowledge through out the course and the material provided by her and also the guidance provided by her, which helped the most in cracking the interview which was my main concern. I thankul to mary for her constant guidance and encouragement to strive success that fuelled me to get what i want in my career.

    8 months ago

    About Instructor

    Mary is global ERP implementation expert, director, program manager, and transformational leader from Dallas, Texas. She has 30 years experience in ERP with 15 years experience in Workday. She is a certified global lead / solution architect who has led multiple conferences and global projects across 60 countries. She is an expert in implementation, Hypercare, Training, Data conversion, Integrations, Change Management, Project Management and Testing. You will get the best training in the world with valuable training documents and practical real time projects.  

     Mary has repeatedly demonstrated her capabilities combining business acumen with strong financial discipline, deep design insights and organizational management skills to successfully grow businesses, lead them through successful turnarounds and revitalization, and manage them across all stages of the business life cycle. She has an established track record of increasing both enterprise and cash flow in companies across multiple industries. She is a growth-focused, results-oriented, and solutions-driven leader with proven history of bringing analytical insights and pragmatic solutions to key business challenges.