Salesforce Security Implementation step by step from scratch | Prateek Singh | Skillshare

Salesforce Security Implementation step by step from scratch

Prateek Singh, Cloud Computing and Big Data Consultant

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
10 Videos (48m)
    • Introduction

    • Creating New User and Active Inactive Freeze

    • Enabling Login Access for System Admin

    • Profiles - What one can do

    • Organization wide Defaults

    • Organization wide Defaults Part - 2

    • Roles - What one can see

    • OWD and Profiles Hands On

    • Roles Hands On

    • Permission Sets Hands on


About This Class

Don't enroll just for the course but enroll for what you'll be after taking this course. Everything is explained step by step Hands on.

Securing access to your applications, data and logic is a key part of application development and system configuration. This security should not only protect data and logic from unauthorized external access, but also from unauthorized internal access for example by only granting data access to users with the appropriate authorization. Salesforce is built around a robust and flexible security architecture, providing you with a fine degree of control over the users, network, and data. Salesforce use a multi layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security. The Salesforce CRM suite of applications include a wide variety of security features and configuration settings.

This course is about platform security framework, which you can use to offer different access permissions to authenticated users within your organization. This security framework lets you grant security permissions to users or profiles, determine access control over a wide range of components (such as tabs or persistent objects), and configure data sharing, which limits access to individual records. Some of this security framework is administrative (only allow these user profiles access to this application), while some is also relevant to your application architecture (ensure that these records are always visible to managers).





  • --
  • Beginner
  • Intermediate
  • Advanced
  • All Levels
  • Beg/Int
  • Int/Adv


Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

Prateek Singh

Cloud Computing and Big Data Consultant

Hi! My name is Prateek and I am a Video instructor at Skillshare. Cloud Computing certified Developer, Consultant and Trainer with more than 6 years of Industry Experience. I have served various Industry verticals having good experience in Splunk, Salesforce, Web Development, Graphic Designing and Object Oriented Programming as well. I have been working on various Adobe products such as Adobe Illustrator, In design , After Effects etc since my school days. I have implemented more than 20 end ...

See full profile

Report class