This training course describes how to deploy and install RSA cloud application and on-premise endpoint security components. Hands-on exercises paired with practical use cases provide a rich educational experience to quickly gain expertise in deploying an RSA SecurID Access system.
This course is designed to help accelerate the learning curve and provide practical experience for individuals planning, deploying, or installing components of an RSA SecurID Access system. Participants leave this training with the knowledge and experience of bringing components to an operational state, information to help build high availability and disaster recovery into their infrastructure and how to perform system configurations to match their security needs.
Current RSA Authentication Manager customers who are planning to add cloud-based multi-factor authentication can particularly benefit from the information and hands-on exercises in this course as well as work with the latest Authentication Manager server and agent capabilities.
Extensive hands-on exercises performed in a virtual lab environment provide experience to build practical skills.
IT, System, or Security Engineers who may be responsible for implementing an RSA SecurID Access system.
Delivery Type Classroom
Duration 4 days
Students should have a fundamental conceptual understanding of network security and multi-factor authentication. Students should be familiar with software installation in both Windows and UNIX/Linux environments and be familiar with IP, networking, and virtualization configurations. Most students find it helpful to have completed RSA SecurID Access Administration I training prior to attending this course. Students must provide their own iOS or Android device (smartphone or tablet) to complete exercises involving the RSA SecurID Access Authenticate mobile app.
Upon successful completion of this training, participants should be able to:
Understand the architecture and deployment options of an RSA SecurID Access system and components
Perform configurations required to make system components operational
Understand the configuration options to support a variety of security and access protection scenarios
Offer guidance and support for user administrators