RSA® Education Services Blog

RSA Governance & Lifecycle – End-User Training

Karim_Kamal
Occasional Contributor Occasional Contributor
Occasional Contributor
0 0 730

 

course_header  copy 4.png

Access Training
for RSA Employees

Access Training
for Customers

 

 

If you need further assistance, contact us

 

Course Description

This Self-Paced training presents various key features and capabilities intended for non-administrative end-users performing different Governance and Lifecycle functions. (i.e., such as supervisors performing reviews, users submitting and/or approving requests, managers compiling reports, etc.) 
14-rsa-customer-success-.png 

Delivery Type

Self Paced

Duration

3 Hours

Cost

Free

Prerequisite Knowledge

None

 

Learning Objectives

Upon completion of this training, the student should be able to: 

  • Become acquainted with the various types of end users performing different functions on RSA G&L.  
  • Demonstrate various demos for each use case on RSA G&L User Interface.  
  • Understand the main concepts of the change request lifecycle. 
  • Know how to submit requests and/or approve/reject change requests.  
  • Understand what rule violations are, how they are triggered, and what actions are required when presented with a violation.  
  • Determine how to submit a password reset request for a user account in RSA G&L and explain how the system performs password synchronization between several resources.  
  • Gain an overview of the access review process and know how to perform access reviews.  
  • Identify how to compile and run reports and charts as stand-alone and within dashboards. 
  • Specify the Out-of-Office status and the conditions and options surrounding the status. 
  • Identify the various delegation options for various assigned tasks. 
  • Determine the various end-user options that are available for the currently logged-in user. 

 

Course Outline

Module # 

Module name 

Learning Objectives / What Student will be able to Do Upon Completing this Module 

Module 1 

Overview 

  • Demonstrate the components of RSA G&L (application modules and main operations and capabilities). 
  • List down the end-user types and each of their responsibilities and roles on RSA G&L.  
  • Identify various different use cases for non-technical business users.  
  • Specify who in an organization could potentially take on the role of the above end-users. 

Module 2 

End-User Options 

  • Identify all the options that are available specifically for end-users such as: 
  • Language 
  • Table View Options 
  • Date Formats 

Module 3 

Access Requests 

  • Understand an overview of the change request lifecycle and the main concepts of workflows. 
  • Know how to submit a request as a requestor, and how to approve/reject a request as an approver.  
  • Perform a Self-Service Password Reset and understand how the system performs password synchronization across several resources. 

Module 4 

Rules & Violations

  • Understand the basics of rules and general rule components. 
  • Identify rule violations and rule actions to be performed when violations are triggered. 
  • Identify what is an exceptional access item and how its generated in the system. 
  • Identify common rule types. 
  • Perform a demo on RSA G&L on the steps to perform when the system assigns your user profile with a rule violation, caused by a rule being triggered. 

Module 5

Access Reviews 

  • Understand the general process and the purpose of access reviews.  
  • Identify the different stakeholders involved in a review. 
  • Determine all review types and requirements for each.  
  • Specify all the various options related to performing access reviews. 
  • Present rule violations resulting from submitting a violating access request and knowing how to maintain/revoke violation.  
  • Know how to perform an access review. 

Module 6

Reports and Analytics 

  • Determine various reporting capabilities available in the system, 
  • Distinguish between reports, charts, and dashboards and the options available for each. 
  • Identify the different types of data that can be provided by the system. 
  • Know how to run reports and various reporting capabilities.  
  • Understand how to run parameterized reports and charts.  

Module 7

Out-of-Office and Delegation Options 

  • Explain Out-Of-Office use cases and the importance of setting the user profile as out of office. 
  • Understand how the system responds to different Out-Of-Office options. 
  • Identify all activities that can be delegated to other users. 

 

Access Training
for RSA Employees

Access Training
for Customers

 

 

If you need further assistance, contact us

3_footer.png