IBM Directory Server 6.4 Fundamentals – TW085G CR,ILO

Short Summary


Learn the processes, procedures, and practices necessary to configure and administer IBM Directory Server using hands-on labs, including troubleshooting some common issues.

 

Details


Course Code: TW085G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 16.00H

Modality: CR,ILO

 

Audience


LDAP Administrators

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Working knowledge of Linux
  • Working knowledge of general security concepts, including SSL, authentication, and authorization

 

Overview


This course describes the processes, procedures, and practices necessary to configure and administer IBM Directory Server. During the hand-on exercises, students will perform basic Directory Server configuration, setup replication, use logs and problem determination tools to troubleshoot directory server.

Students will not only learn about the components, functions, and features that are part of the directory server, but will learn about typical deployment scenarios of the directory server, as well.

 

Topic


  • Unit 1: IBM Directory Server overview
  • Unit 2: Managing directory data
  • Unit 3: Directory Server features
  • Unit 4: Distributed Directories
  • Unit 5: Performance
  • Unit 6: Problem determination

 

Objectives


  • Define LDAP and discuss concepts regarding LDAP standards
  • Manage directory entries and search the directory; explain the purpose of the directory schema
  • Define the security features of IBM Directory Server
  • Define the replication features of IBM Directory Server
  • Define the performance features of IBM Directory Server
  • Define problem determination facilities
Share this

IBM Access Manager Platform Foundations – TW107G CR,ILO

Short Summary


IBM Access Manager simplifies access management across web, mobile, and cloud. In this course, you will learn to configure authentication, authorization, and policy access control.

 

Details


Course Code: TW107G

Brand: Identity and Access Management

Category: Security

Skill Level: Intermediate

Duration: 24.00H

Modality: CR,ILO

 

Audience


This course is designed for system administrators and implementors interested in learning IBM Access Manager.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP, TCP/IP and HTTP
  • Familiarity with the Linux command-line
  • Basic knowledge of JavaScript
  • Working knowledge of security concepts, including SSL, authentication, and authorization

 

 

Overview


IBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi-factor authentication and risk-based access.†You can use IBM Access Manager to adopt secure web, mobile, and cloud technologies and simplify access management for your employees and consumers. Using the skill taught in this course, you will be able to configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests.

 

Topic


Unit 1: Introduction to IBM Access Manager
Unit 2: Architecture and installation
Unit 3: Managing users, groups, and domains
Unit 4: Reverse proxy concepts
Unit 5: Policy based access control
Unit 6: Configuring junctions for back-end resources
Unit 7: Authentication framework and methods
Unit 8: Logging, auditing, and tracing

 

Objectives


  • Describe IBM Access Manager product and its key features
  • Discuss the architecture and deployment process
  • Configure Access Manager users, groups and domains
  • Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure
  • Describe protected object space and the policy access control model
  • Explain how to set up reverse proxy junctions to handle web requests
  • Discuss and configure authentication mechanisms supported by Access Manager
  • Explain and set up logging, auditing, and tracing for Access Manager components
Share this

IBM Access Manager Platform Foundations – Self-Paced Virtual Class (SPVC) – TW107XG SPVC

Short Summary


IBM Access Manager simplifies access management across web, mobile, and cloud. In this course, you will learn to configure authentication, authorization, and policy access control.

 

Details


Course Code: TW107XG

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 24.00H

Modality: SPVC

 

Audience


This course is designed for system administrators and implementors interested in learning IBM Access Manager.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP, TCP/IP and HTTP
  • Familiarity with the Linux command-line
  • Basic knowledge of JavaScript
  • Working knowledge of security concepts, including SSL, authentication, and authorization

 

Overview


IBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi-factor authentication and risk-based access. You can use IBM Access Manager to adopt secure web, mobile, and cloud technologies and simplify access management for your employees and consumers. Using the skill taught in this course, you will be able to configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests.

Please note: This is a self-paced virtual class containing course manuals and an online lab environment only. No audio or video is included with this course.

 

Topic


Unit 1: Introduction to IBM Access Manager
Unit 2: Architecture and installation
Unit 3: Managing users, groups, and domains
Unit 4: Reverse proxy concepts
Unit 5: Policy based access control
Unit 6: Configuring junctions for back-end resources
Unit 7: Authentication framework and methods
Unit 8: Logging, auditing, and tracing

 

Objectives


  • Describe IBM Access Manager product and its key features
  • Discuss the architecture and deployment process
  • Configure Access Manager users, groups and domains
  • Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure
  • Describe protected object space and the policy access control model
  • Explain how to set up reverse proxy junctions to handle web requests
  • Discuss and configure authentication mechanisms supported by Access Manager
  • Explain and set up logging, auditing, and tracing for Access Manager components
Share this

IBM Security Identity Manager Foundations – TW255G CR,ILO

Short Summary


This course provides the foundational skills necessary to configure, administer, and accomplish the major business functions provided by IBM Identity Manager.

 

Details


Course Code: TW255G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 32.00H

Modality: CR,ILO

 

Audience


This course is designed for system administrators and implementers who deploy and manage IBM Security Identity Manager in an organization.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP and TCP/IP fundamentals
  • Familiarity with JavaScript
  • Familiarity with Linux

 

Overview


This is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the following formats software stack and virtual appliance. This course applies to both formats.

The course also includes many hands-on exercises to supplement the lecture. The hands-on labs are conducted using Identity Manager v.7.0.1.10.

 

Topic


Unit 1: Introduction to IBM Security Identity Manager
Unit 2: Architecture and installation
Unit 3: Managing organization, users, and roles
Unit 4: Loading user data
Unit 5: Configuring managed resources in IBM Security Identity Manager
Unit 6: Provisioning resources
Unit 7: Managing workflows and lifecycle operations
Unit 8: Using the reporting feature
Unit 9: Managing access to IBM Security Identity Manager consoles
Unit 10. Configuring selective password synchronization
Unit 11. Managing logging properties

 

Objectives


  • Describe the value proposition of the IBM Security Identity Manager
  • Discuss the architecture and deployment process
  • Manage organizational structure, users, and roles
  • Describe how to upload users to Identity Manager using the  identity feed process
  • Configure services and policies for Identity Manager endpoints
  • Configure and automate resource provisioning
  • Customize workflows and lifecycle operations
  • Implement reporting using default and custom reports
  • Manage access to the Identity Manager consoles
  • Configure selective password synchronization
  • Manage logging properties
Share this

IBM Identity Governance and Intelligence Foundations – TW401G CR,ILO

Short Summary


This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by IBM Identity Governance and Intelligence.

 

Details


Course Code: TW401G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 24.00H

Modality: CR,ILO

 

Audience


This course is designed for security professionals who administer IBM Identity Governance and Intelligence.

 

Prerequisites


  • Basic knowledge of information security concepts
  • Basic knowledge of identity management and governance concepts and strategy

 

Overview


IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.

 

Topic


Unit 1: Introduction to IBM Identity Governance and Intelligence
Unit 2: Deployment planning considerations
Unit 3: Managing the exchange of data
Unit 4: Role lifecycle management
Unit 5: Access risk control modeling
Unit 6: Certification campaigns
Unit 7: Workflow processes
Unit 8: Reporting

 

Objectives


  • Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
  • Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
  • Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
  • Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
  • Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
  • Describe each type of certification campaign in IGI; configure and run certification campaigns
  • Describe how the Process Designer module helps you design and define authorization processes
  • Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements
Share this

© 2021 Predictive Analytical Resources Limited. All rights reserved.

Click Me
×

Welcome to PARL Support

×