SlideShare a Scribd company logo
1 of 14
Download to read offline
ISIDM001: Identity Management
Overview
EnH iSecure Private Limited
Disclaimer
EnH ISecure Private Limited (iSecure) has custom created the course content for identity management using genuine & legal licenses. The courseware
provided in the training contents has been written by the authorized and qualified content writers and technical writers of iSecure.
Every care has been taken by the staff of iSecure in compilation of the data contained herein and in verification of its accuracy when published,
however the content of this training course is subject to change without notice due to factors outside the control of iSecure and this courseware
should, therefore, be used as a guide only. For example, the products referred to in this publication are continually improved through further research
and development and this may lead to information contained in this courseware being altered without notice.
Disclaimer: No Liability
iSecure, its staff, or its Member Companies shall not be held liable for any improper or incorrect use of these courseware and assumes no responsibility
for any user's use of them. In no event shall iSecure, its staff, or its Member Companies be liable for any direct, indirect, incidental, special, exemplary or
consequential damages (including, but not limited to: loss of use, data, or profits; or business interruption) however caused and on any theory of
liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of these training materials, even if
advised of the possibility of such damage.
Disclaimer: No Warranty
Material in the courseware may include technical inaccuracies or typographical errors. Changes may be periodically incorporated into the
courseware.
Disclaimer: No unethical business
iSecure, its staff, or its Member Companies shall not engage in any unethical means to support customers or subscribers of this training. iSecure, its staff,
or its Member Companies shall not engage officially or on personal status supporting any unethical business means.
Copyright © Information
Unauthorized reproduction in whole or in part is an infringement of copyright. iSecure will actively pursue any breach of its copyright.
® Trademarks
All product names, logos, and brands are property of their respective owners. All company, product and service names used in the courseware are for identification purposes only. Use of these names, logos, and brands does
not imply endorsement.
Identity Management Overview
Meet you trainer
• Decade + experience in Identity management domain & technology
expertise
• Experienced in Sailpoint, Oracle, BMC, Microsoft, SUN Identity Management
Products
• Experience in Siteminder, Cyber Ark, SUN, Oracle access Management
products
• Worked with large scale Banks, Retail, Utilities, customers implementing
IAM Solutions
Why should you learn Identity Management?
• 91% increase in Cyber attacks since 2013
• 40% customers experienced a data breach or failed audit in 2014
• 1 in 7 employees might sell their login credentials for $150
• 89% believe there is more risk from inside
• Huge fines levied upon failed audits
• BYOD, BYOI, BYO….
• Security is the primary driver for IAM
* Few statistics are derived from Sailpoint’s webcast
Technology vs. Risk Understanding
• What is a CISCO L7 switch Capable of?
• What is a NAV Server and what all might you be able to do?
• Do you know the difference between a DDL & DML statement?
• How do you connect?
• In an enterprise?
• Out in the personal life?
• Do you understand Risk?
What does the training cover
• Identity Management
• Worldwide frauds
• Identity
• Financial
• SOx & HIPPA
• Other frameworks
• Concepts
What does the training cover …
• Lightweight Directory Access Protocol
• Users
• Groups
• Organizations
• Object classes
• Applications
• Real world applications
• Access managed by LDAP
What does the training cover …
• Middleware
• Application servers
• Web servers
• Capabilities
• Virtualization
• Concept
• Necessity
• Configurations
What does the training cover …
• Introduction to Oracle Identity Management
• Creating your own Virtual Machine
• Data Loading
• Catalog Build and Usage
• Security & Role Modelling
• UI Customization
• Approvals
• Sandboxes
• Disconnected Resources
What does the training cover …
• Attestations/Certifications
• BI reports
• Data Modeling
• Other certification products and their capabilities
Features
12
• Comprehensive training
• Lab material developed with baby steps for easy execution
• Empowers trainee to get onboard onto a live project
• Impeccable Functional Knowledge
• In-depth teaching of the product
• Tips & Tricks
• Email support for training content & exercises
13
ENH SMAC Solutions Private Limited
CIN: U72300TG2015PTC102410
ENH Customer Centric Private Limited
CIN: U74120TG2015PTC102446
ENH iSecure Private Limited
CIN: U72300TG2015PTC102440
#C103, NCC Urban, Gachibowli, Hyderabad – 500028
Phone: +91 9959 800 400
www.enhcorp.com

More Related Content

Similar to isecure's Identity Management Training Intro

Pacific-Portfolio-2016
Pacific-Portfolio-2016Pacific-Portfolio-2016
Pacific-Portfolio-2016Ella Moeller
 
Pacific portfolio-2016
Pacific portfolio-2016Pacific portfolio-2016
Pacific portfolio-2016Ella Moeller
 
Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Exin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewExin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewInvensis Learning
 
Sap security - How to.pdf
Sap security - How to.pdfSap security - How to.pdf
Sap security - How to.pdfssuser2e0e7a
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Identity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in NoidaIdentity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in Noidaidentityskills
 
Reasons to “Enroll” at CyberArk with InfosecTrain.pptx
Reasons to “Enroll” at CyberArk with InfosecTrain.pptxReasons to “Enroll” at CyberArk with InfosecTrain.pptx
Reasons to “Enroll” at CyberArk with InfosecTrain.pptxInfosectrain3
 
Integrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIntegrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIBM Security
 
Enroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in DubaiEnroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in Dubaitraininginstitutelau
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeSecurity Innovation
 

Similar to isecure's Identity Management Training Intro (20)

Pacific-Portfolio-2016
Pacific-Portfolio-2016Pacific-Portfolio-2016
Pacific-Portfolio-2016
 
Pacific portfolio-2016
Pacific portfolio-2016Pacific portfolio-2016
Pacific portfolio-2016
 
Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
CISM sertifikacija
CISM sertifikacijaCISM sertifikacija
CISM sertifikacija
 
Exin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewExin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course Preview
 
Sap security - How to.pdf
Sap security - How to.pdfSap security - How to.pdf
Sap security - How to.pdf
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Identity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in NoidaIdentity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in Noida
 
Reasons to “Enroll” at CyberArk with InfosecTrain.pptx
Reasons to “Enroll” at CyberArk with InfosecTrain.pptxReasons to “Enroll” at CyberArk with InfosecTrain.pptx
Reasons to “Enroll” at CyberArk with InfosecTrain.pptx
 
Integrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIntegrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLC
 
Enroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in DubaiEnroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in Dubai
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Microtek learning
Microtek learningMicrotek learning
Microtek learning
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

isecure's Identity Management Training Intro

  • 2. Disclaimer EnH ISecure Private Limited (iSecure) has custom created the course content for identity management using genuine & legal licenses. The courseware provided in the training contents has been written by the authorized and qualified content writers and technical writers of iSecure. Every care has been taken by the staff of iSecure in compilation of the data contained herein and in verification of its accuracy when published, however the content of this training course is subject to change without notice due to factors outside the control of iSecure and this courseware should, therefore, be used as a guide only. For example, the products referred to in this publication are continually improved through further research and development and this may lead to information contained in this courseware being altered without notice. Disclaimer: No Liability iSecure, its staff, or its Member Companies shall not be held liable for any improper or incorrect use of these courseware and assumes no responsibility for any user's use of them. In no event shall iSecure, its staff, or its Member Companies be liable for any direct, indirect, incidental, special, exemplary or consequential damages (including, but not limited to: loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of these training materials, even if advised of the possibility of such damage. Disclaimer: No Warranty Material in the courseware may include technical inaccuracies or typographical errors. Changes may be periodically incorporated into the courseware. Disclaimer: No unethical business iSecure, its staff, or its Member Companies shall not engage in any unethical means to support customers or subscribers of this training. iSecure, its staff, or its Member Companies shall not engage officially or on personal status supporting any unethical business means. Copyright © Information Unauthorized reproduction in whole or in part is an infringement of copyright. iSecure will actively pursue any breach of its copyright. ® Trademarks All product names, logos, and brands are property of their respective owners. All company, product and service names used in the courseware are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.
  • 4. Meet you trainer • Decade + experience in Identity management domain & technology expertise • Experienced in Sailpoint, Oracle, BMC, Microsoft, SUN Identity Management Products • Experience in Siteminder, Cyber Ark, SUN, Oracle access Management products • Worked with large scale Banks, Retail, Utilities, customers implementing IAM Solutions
  • 5. Why should you learn Identity Management? • 91% increase in Cyber attacks since 2013 • 40% customers experienced a data breach or failed audit in 2014 • 1 in 7 employees might sell their login credentials for $150 • 89% believe there is more risk from inside • Huge fines levied upon failed audits • BYOD, BYOI, BYO…. • Security is the primary driver for IAM * Few statistics are derived from Sailpoint’s webcast
  • 6. Technology vs. Risk Understanding • What is a CISCO L7 switch Capable of? • What is a NAV Server and what all might you be able to do? • Do you know the difference between a DDL & DML statement? • How do you connect? • In an enterprise? • Out in the personal life? • Do you understand Risk?
  • 7. What does the training cover • Identity Management • Worldwide frauds • Identity • Financial • SOx & HIPPA • Other frameworks • Concepts
  • 8. What does the training cover … • Lightweight Directory Access Protocol • Users • Groups • Organizations • Object classes • Applications • Real world applications • Access managed by LDAP
  • 9. What does the training cover … • Middleware • Application servers • Web servers • Capabilities • Virtualization • Concept • Necessity • Configurations
  • 10. What does the training cover … • Introduction to Oracle Identity Management • Creating your own Virtual Machine • Data Loading • Catalog Build and Usage • Security & Role Modelling • UI Customization • Approvals • Sandboxes • Disconnected Resources
  • 11. What does the training cover … • Attestations/Certifications • BI reports • Data Modeling • Other certification products and their capabilities
  • 12. Features 12 • Comprehensive training • Lab material developed with baby steps for easy execution • Empowers trainee to get onboard onto a live project • Impeccable Functional Knowledge • In-depth teaching of the product • Tips & Tricks • Email support for training content & exercises
  • 13. 13
  • 14. ENH SMAC Solutions Private Limited CIN: U72300TG2015PTC102410 ENH Customer Centric Private Limited CIN: U74120TG2015PTC102446 ENH iSecure Private Limited CIN: U72300TG2015PTC102440 #C103, NCC Urban, Gachibowli, Hyderabad – 500028 Phone: +91 9959 800 400 www.enhcorp.com