<?php the_title_attribute(); ? data-src=
Admin bar avatar

Bodhi IT

 4 (5 Reviews)

Course Duration

40 hour

Course Description

MODE OF TRAINING: Online

LEVEL: Advanced

Step 1 : Identity Administration

It all starts with the administrationThe challenge is ensuring that access and permissions for all users, to all systems and all resources, are accurate and appropriate.

What you’re up against

Automating identity administration is critical. However, if you can’t manage user accounts and enterprise-wide entitlements securely and quickly, your organization is at risk and productivity will suffer.

How this affects you

Managing accounts and access keeps your organization productive and compliant with industry and government regulations. The process is often complex, difficult, and involves too many people. Plus, you face expensive and potentially embarrassing results if you are unable to quickly terminate access when someone leaves or changes roles. You feel its effects in your elevated stress level, wasted time, and knowing that your productivity is suffering.

Step 2: Identity Governance

The goal is governance. But the challenge is ensuring that access for all users, to all systems is accurate and appropriate – and all identity decisions and actions follow policies and can be proven when necessary.

What you’re up against

Governing access (all types of access) is critical. Having visibility, control and reporting on access is mandatory, but there’s risk at every turn – internally and externally.

How this affects you

You struggle to determine who has access to what resources in your hybrid on-prem and cloud environment. And it’s even more difficult to answer the question of whether the entitlements users have to systems, applications, and data are even what they are supposed to have. Compliance demands it, but that doesn’t make it any easier. All this not-knowing adds undue stress to you and your team.

Step 3: Privileged Access Management

Privileged accounts are a necessity. But the challenge is ensuring that they are protected, monitored, and used only when necessary.

What you’re up against

Securing privileged accounts is essential. If you can’t ensure that only the people that need to access them can, and only with just the right level pf entitlements to do their job, you put your organization at risk.

How this affects you

You don’t have the time or the budget to address every privileged account and every privileged user on a point-by point basis, and the overhead to implement typical PAM solutions if simply too high.

Step 4: AD Account Lifecycle Management

Active Directory is a great place to start your journey to security.

For many organizations, the most challenging system on which to implement IAM is a hybrid Active Directory environment.

What you’re up against

Managing AD and AAD accounts, objects and groups is a cumbersome and error-prone task, and it is often the barrier to achieving more advanced objectives, such as privileged access management, and identity governance and administration (IGA)

How this affects you

You spend all your efforts simply managing all your AD account processes, which is a serious drag on efficiency. Native tools are insufficient for managing critical admin access for AD and AAD. And until those foundational needs are met, your organization is in no position to address more impactful and higher-level IAM functions, such as IGA and PAM.

Projects

  1. To test your knowledge after training, you will be required to work on projects that have real-time use cases. This will also ensure hands-on expertise in real-time concepts.
  2. These projects are completely in-line with the modules mentioned in the curriculum.

One Identity by Quest Curriculum

Topics
  • Identity Manager
  • Access Manager
  • Sources(Data & Events)
  • Group Directories
  • Privileged & Platform Directories
  • TPAM(Total Privileges Access Management)
  • Application Onboarding
  • Password Manager
  • Privileged Password Manager
  • Integration Types
  • Review Manager
  • Tool overview

Identity Manger :- (One Identity)
  • Concentration
  • Lifecycle
  • Requests
  • Fulfillment
  • Governance
  • Roles & Rules
  • Role Assignment
  • Password Policies

Sources(Data & Events)
  • HR Systems
  • GDW(Group Data Ware House)
  • My service(Service Now)
  • Configuration Management(CMDB)
  • Automated IT service(Agility for AWS)
  • Bulk On boarding

Group Directories :- (OUD)
  • GLAM
  • GWAM

Privileged & Platform Directories :- (AD)
  • PAM AD
  • PPAM AD

TPAM(Total Priviliges Access Management)
  • Requests
  • Password Vault
  • Password Generator
  • Session Manager
  • Asset Types

Application Onboarding
  • Load sheets(Development of App)
  • csv files
  • Validations
  • Types of loadsheet
  • Dependencies
  • Self Service (UI based)

Password Manager :- (PM)
  • Tool based
  • UI Based
  • Question based (when account got locked)

Privileged Password Manager (PPM)
  • Tool Based
  • Admin

Integration Types
  • UNS
  • AD
  • DIF
  • PAM
  • PPAM

Access Manager (ISAM)
  • Authentication level
  • Authorization level
  • Authentication policies
  • Authorization Policies
  • Federation
  • Web SSO

Review Manager
  • User Access review
  • SOD (Segregation of Duties)

Tool Overview
  • UI Based
  • Tool Based

    One Identity by Quest Curriculum

    • Identity Manager
    • Access Manager
    • Sources(Data & Events)
    • Group Directories
    • Privileged & Platform Directories
    • TPAM(Total Privileges Access Management)
    • Application Onboarding
    • Password Manager
    • Privileged Password Manager
    • Integration Types
    • Review Manager
    • Tool overview

    • Concentration
    • Lifecycle
    • Requests
    • Fulfillment
    • Governance
    • Roles & Rules
    • Role Assignment
    • Password Policies

    • HR Systems
    • GDW(Group Data Ware House)
    • My service(Service Now)
    • Configuration Management(CMDB)
    • Automated IT service(Agility for AWS)
    • Bulk On boarding

    • GLAM
    • GWAM

    • PAM AD
    • PPAM AD

    • Requests
    • Password Vault
    • Password Generator
    • Session Manager
    • Asset Types

    • Load sheets(Development of App)
    • csv files
    • Validations
    • Types of loadsheet
    • Dependencies
    • Self Service (UI based)

    • Tool based
    • UI Based
    • Question based (when account got locked)

    • Tool Based
    • Admin

    • UNS
    • AD
    • DIF
    • PAM
    • PPAM

    • Authentication level
    • Authorization level
    • Authentication policies
    • Authorization Policies
    • Federation
    • Web SSO

    • User Access review
    • SOD (Segregation of Duties)

    • UI Based
    • Tool Based

0.0
0 total
5
0
4
0
3
0
2
0
1
0

Course Features

  • Students Limited
  • Certificate Yes
  • Skill Advance
  • Category Cloud

Request for Free Demo

    Training Features

    Live Online Training

    Live online training session will be given by our trainers and are available to answer your queries.

    Time flexibility

    We conduct classes in most of the day. We are flexible to train you according to your schedule.

    Real time scenario

    All of our trainers are come from different industry they are experts in explaining scenarios that are happening in real time.

    Best IT Leading Software Training Institute

    Talk with Bodh IT