Course description
SharePoint has a very comprehensive security system, and the part that is of most interest to developers is the security within a SharePoint site. Within a site you work with users and groups, permission levels, permissions for sites, lists and list items. In this course you will have the know-how to understand and program with users and groups, create and apply permissions, and how to configure anonymous access permissions programmatically.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
This course assumes that students have some Web development background and some experience using Visual Studio 2012.
Meet the expert
Tim McCarthy is a senior solutions architect with Perficient who designs and builds highly scalable, layered web, desktop, and mobile applications utilizing the latest Microsoft platforms and technologies. His expertise covers a wide range of Microsoft technologies including SharePoint/Office 365, Office Apps, Windows Phone, Windows 8, Azure, .NET Framework (ASP.NET, VSTO, Workflow, WCF, WPF), SQL Server, Active Directory, MS Exchange development, and Service Oriented Architecture (SOA) applications. Tim holds multiple Microsoft certifications and is a former Microsoft MVP in Solutions Architecture. He is the author of several books, has developed presentations for the Microsoft Developer Network (MSDN), and has written articles for SQL Server Magazine and Windows and .NET Magazine. He has been a featured speaker at conferences, user groups, and code camps worldwide. Before becoming an application developer, Tim was an officer in the United States Marine Corps.
Video Runtime
96 Minutes
Time to complete
260 Minutes
Course Outline
Overview (04:11)
Users And Groups (34:09)
Permissions (12:26)
Security Inheritance (29:02)
Identifying Permissions (10:04)
Anonymous Access (06:19)