Course provided by Udemy

Study type: Online

Starts: Anytime

Price: See latest price on Udemy


If you are concerned that network users can, intentionally or by accident, alter or modify settings or code in your networked database, you have come to the right place!  Every single step is covered for maximizing the security of the front end/back end databases from the Network 1 course!   Having installed Access on dozens of networks, I have had to develop methods to prevent users from being anywhere in the system that I don’t want them to be.  So why suffer through another phone call for errors that could be completely avoided? I will show you how to eliminate the possibility of them ever happening!

This course shows you how to many techniques for using VBA to control how users log in to and use the database. If you have no familiarity with VBA, you may get frustrated, but every step is illustrated and you are provided with beginning and ending versions of the databases.  For some this could be a quick intro into the incredible power of VBA that will convince them that they really should take the Intro to VBA course.  For others who have already done all or part of that course, 90% these techniques are totally new and will extend the students knowledge of VBA quite a bit.

Most of the employees in my client businesses have small networks staffed with people who know nothing about Access and they don’t want to have to figure out how the ribbon and navigator work, that is why they are always hidden.  The systems I build using these techniques let people with zero knowledge of Access get productive on the network quickly.  Believe me, there is a huge and growing need for people who can setup easy to use shared database networks like these and there just aren’t enough people who know how to do it right! 

None of this is theory and you won’t find these techniques in any book. The content of this course is a breakdown of the methods I successfully use to administer dozens of networks for my client businesses. I learned a long time ago that you have to automate every routine job that you can, but also you must eliminate downtime for your client and yourself by making silly mistakes. These methods of keeping the network users from even seeing anything they do not need to know about just increase productivity and reduce downtime.  

Just take a look at the demo video and see what logging into the finished database looks like.  It doesn’t look much like Access!  Many of the employees in my client businesses do not even know they are using Access (and they really don’t care).  All they know is it is way easier to get their job done than it used to be! 

Follow along as I take you step by step through the modification of the front and back end databases from the Networking Made Simple course and show you tools that you will be using for years to come! This course will show you :

  1. How to “Encrypt” an Access database.
  2. How to link to encrypted backend databases from the frontend.
  3. The basics of creating a User Login table.
  4. How to create a simple, yet powerful login form.
  5. How to validate passwords and determine the employee security level.
  6. How to develop a secure database without locking yourself out.
  7. How to create a “dialog” login form that cannot be bypassed.
  8. How to hide or unhide the menus and Navigation Pane.
  9. How to set database security properties.
  10. How to create a custom BLANK ribbon!
  11. How to build in a backdoor for Administrators.
  12. How to Password Protect all your VBA Code.
  13. How to Deploy the Updated Database

If you take the time to learn these techniques you will save MANY HOURS of time and avoid wasting time on problems caused by users being where they should not be in the database!

If you want to become the Network Database Guru, click the Take This Course button to get started on this journey to increased productivity and higher value for you in the marketplace. Think of it! In just a few HOURS you know more about securing databases and controlling users on an Access network than almost everyone else!

Expected Outcomes

  1. Secure an Access database so that users do not have the ability to change forms or programs.