RSA Identity Governance & Lifecycle Fundamentals Series

Document created by Joseph Cantor Employee on May 9, 2019Last modified by Joseph Cantor Employee on Nov 6, 2019
Version 5Show Document
  • View in full screen mode

Access Training

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

 

Summary

This series of self-paced On-Demand learning courses introduces and explains the critical functions and capabilities of the RSA Identity Governance and Lifecycle product..

 

Overview

Through a collection of several modularized courses, this On-Demand learning series introduces basic concepts across a variety of functions, capabilities, and operations available in the RSA Identity Governance and Lifecycle product. At a high level, this set of courses offers function overviews, planning considerations, recommended practices, and use cases for various situations.

 

Audience
RSA Identity Governance and Lifecycle administrators, implementers, managers and other business and technical users who need to understand the capabilities and functions of the RSA Identity Governance and Lifecycle product.


Delivery Type
On-Demand Learning


Duration
2 hours


Prerequisite Knowledge/Skills

A general familiarity with the concepts of identity management, access management, and resource and authorization controls is helpful to maximize the benefit of the course material.

 

Learning Objectives

Upon successful completion of this course, participants should be able to:

  • Management of Access Certifications
  • Governance of Data Access
  • Creation of policies and rules
  • Management of Joiner/Mover/Leaver users
  • Processing of Access Requests
  • Management of users by role
  • Provisioning access to resources

 

 

 

 

 

Access Training

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

Attachments

    Outcomes