Training offering

Amstar Technologies Pvt Ltd

IBM Identity Governance and Intelligence Foundations

Information

Length: 24.0 Hours
Course code: TW400G
Delivery method:

Click on a delivery method to see details

Classroom

Instructor Led Online

Price: 62000 INR

Session dates

Date Location  
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Bangalore
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en
Virtual IST
62000 INR before tax
language: en

Overview

IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.

Public

This course is designed for security professionals who administer IBM Identity Governance and Intelligence.

 

Prerequisits

  • Basic knowledge of information security concepts
  • Basic knowledge of identity management and governance concepts and strategy

 

Objective

  • Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
  • Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
  • Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
  • Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
  • Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
  • Describe each of the five types of certification campaign in IGI; configure and run certification campaigns
  • Describe how the Process Designer module helps you design and define authorization processes
  • Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements