Course Details

Your Growth, Our Mission

IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONS
Course Description
IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.
  1. Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
  2. Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
  3. Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
  4. Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
  5. Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
  6. Describe each type of certification campaign in IGI; configure and run certification campaigns
  7. Describe how the Process Designer module helps you design and define authorization processes

Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements

This course is designed for security professionals who administer IBM Identity Governance and Intelligence.

  1. Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
  2. Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
  3. Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
  4. Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
  5. Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
  6. Describe each type of certification campaign in IGI; configure and run certification campaigns
  7. Describe how the Process Designer module helps you design and define authorization processes

Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements

Request Info

Course Rounds

3 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM