RSA Archer Solution Area: Business Resiliency

Document created by Craig Hansen Employee on Feb 17, 2016Last modified by Connor Mccarthy on Nov 29, 2017
Version 18Show Document
  • View in full screen mode

 

Register Now

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

 

Summary

This on-demand learning provides an overview of the RSA Archer Business Resiliency Solution, and Out-of-the-Box business use cases.

 

Overview

This on-demand learning is a follow-on to the RSA Archer Solutions Overview (which provides a high level description of all Archer Solution areas). This course provides a more in-depth look at the issues and challenges of Business Resiliency, and the capability pf the use cases that comprise the solution. Students will learn about the key personas involved in the Business Resiliency solution, as well as the typical Business Resiliency use cases and workflows.

 

Audience

Anyone interested in an overview of the RSA Archer Business Resiliency Solution. Particularly RSA Customers, RSA Product Specialists, RSA Customer Service, RSA New Hires, RSA Partners, RSA MSSP and RSA Staff.

 

Delivery Type

On-Demand Learning

 

Duration

60 minutes

 

Prerequisite Knowledge/Skills

RSA Archer Solutions Overview and familiarity with basic principles of GRC (Governance, Risk, and Compliance)

 

Learning Objectives

Upon completion of this training, the learner should be able to:

  • Clarify the definition of Business Resiliency
  • Define the individual Archer Components that make up the solution
  • Review the primary use cases that make up the solution
  • Explain why organizations need Business Continuity (BC) and Disaster Recovery (DR)
  • Identify who the typical users are and their responsibilities

 

Course Outline

  • Defining Business Resiliency
  • Defining the Use Cases
  • Implementing the Use Cases
  • Identifying the reasons why organizations need Business Resiliency and when the individual use cases apply
  • Finding the Threat – Use Cases
    • Webshell
    • Malicious Insider
    • Phishing Challenge Lab
  • Identifying the typical users.
  • Typical users’ responsibilities

Register Now

 

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

Attachments

    Outcomes