RSA Identity Governance & Lifecycle: Deployment Scenarios

Document created by Connor Mccarthy Employee on Nov 16, 2017Last modified by Joseph Cantor on Nov 6, 2019
Version 17Show Document
  • View in full screen mode

Access Training

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

 

Summary

This On-Demand eLearning presents the various supported deployment options for RSA Identity Governance and Lifecycle.

 

Overview

This On-Demand eLearning course discusses in detail the various supported deployment options for RSA Identity Governance and Lifecycle. Content includes criteria for decision making purposes and shows why or when you would choose one over the other.  This course has architectural maps and animated demos to enhance the student's understanding of each concept.

 

Audience
Anyone interested in the different deployment models supported by RSA Identity Governance and Lifecycle.

 

Prerequisite Knowledge/Skills

None

 

Delivery Type
On-Demand Learning (self-pacing eLearning)

 

Duration
30 minutes

 

.Learning Objectives

Upon successful completion of this course, participants should be able to:

  • Distinguish between the different deployment models.
  • Understand which components are supplied by RSA for the different deployment
    scenarios.
  • Identify which deployment scenario is suitable based on the customer’s environment.

 

Course Outline

  • RSA Identity Governance and Lifecyle Deployment Models:
    • Hardware Appliance
    • Software Bundle with RSA-supplied database
    • Virtual Application with RSA-Supplied Database
    • Software Bundle with Customer-supplied database
    • Software Only
    • Virtual Application with Customer-Supplied Database
  • Which Deployment Model?

 

 

 

 

 

Access Training

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

Attachments

    Outcomes