IdentityIQ Business Administration: Certification v8.0

Course Overview

This course teaches students how to configure & manage certification campaigns in IdentityIQ. Access certifications, also known as access reviews or attestations, help a business ensure & verify that users have only the access they should have to perform their jobs.

 

Prerequisites

 IdentityIQ Introduction course

Audience Profile

This course is intended for:

  •  Compliance officers
  •  Business analysts
  •  Technical implementers
  •  System administrators

Learning Objectives:

Upon completion of this course, professionals will be able to:

  •  Select the appropriate certification type for a given business objective
  •  Apply the correct certification configuration settings to achieve the desired result
  •  Extend the certification function using rules provided by the technical team
  •  Schedule certifications
  •  Confirm the certification configuration
  •  Monitor certifications using reports, advanced analytics, & the certifications themselves
  •  Use best practices when creating certification campaigns

Content Outline

  •  Course Introduction 
  •  Certification Overview 
  •  Targeted Certifications 
  •  Manager & Advanced Certifications 
  •  Application Owner & Entitlement Owner Certifications 
  •  Unguided Exercise Solutions 
  •  Role Membership\Composition & Account Group Certifications 
  •  Event Based Certifications 
  •  Certification Monitoring & Managing 
  •  Certification Administration Best Practices

FAQs

It ensures that identities accessing the application have the necessary permissions. Certification of the Entitlement Owner: Advanced certification: Ensure that identities in a population or group have appropriate access.

 This course is intended for:

  • Compliance officers
  • Business analysts
  • Technical implementers
  • System administrators

A: To attend the training session, you should have an active desktop or Laptop with the required specification and a good internet connection to access the labs. 

SailPoint's Identity Security Platform features a built-in extensibility framework that provides event triggers, APIs, & a drag-& drop-workflow interface to quickly & seamlessly integrate identity security into your existing business processes & ecosystem of applications.

A: Technical issues are unpredictable & might occur with you as well. Participants must ensure that they have the system with the required configuration and good internet speed to access online labs.

If the problem persists or you face any challenge during the class, you can report it to us or your trainer. In that case, Radiant would provide you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption & NOT for distribution or commercial use.

A: Radiant Techlearning offers a training program on weekdays, weekends & a combination of weekdays & weekends. You can always choose the schedule that best suits your need.

A: Once we receive your enrollment request, we will share the details with you to select & complete the enrollment process.

You can email us at the below email address (whichever is applicable) to know the upcoming schedule for a specific technology training program.

Individual:  training@radianttechlearning.com

Corporate: Corporate@radiantechlearning.com

Send a Message.


  • Enroll