ISIDM001: Identity Management
Overview
EnH iSecure Private Limited
Disclaimer
EnH ISecure Private Limited (iSecure) has custom created the course content for identity management using genuine & legal licenses. The courseware
provided in the training contents has been written by the authorized and qualified content writers and technical writers of iSecure.
Every care has been taken by the staff of iSecure in compilation of the data contained herein and in verification of its accuracy when published,
however the content of this training course is subject to change without notice due to factors outside the control of iSecure and this courseware
should, therefore, be used as a guide only. For example, the products referred to in this publication are continually improved through further research
and development and this may lead to information contained in this courseware being altered without notice.
Disclaimer: No Liability
iSecure, its staff, or its Member Companies shall not be held liable for any improper or incorrect use of these courseware and assumes no responsibility
for any user's use of them. In no event shall iSecure, its staff, or its Member Companies be liable for any direct, indirect, incidental, special, exemplary or
consequential damages (including, but not limited to: loss of use, data, or profits; or business interruption) however caused and on any theory of
liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of these training materials, even if
advised of the possibility of such damage.
Disclaimer: No Warranty
Material in the courseware may include technical inaccuracies or typographical errors. Changes may be periodically incorporated into the
courseware.
Disclaimer: No unethical business
iSecure, its staff, or its Member Companies shall not engage in any unethical means to support customers or subscribers of this training. iSecure, its staff,
or its Member Companies shall not engage officially or on personal status supporting any unethical business means.
Copyright © Information
Unauthorized reproduction in whole or in part is an infringement of copyright. iSecure will actively pursue any breach of its copyright.
® Trademarks
All product names, logos, and brands are property of their respective owners. All company, product and service names used in the courseware are for identification purposes only. Use of these names, logos, and brands does
not imply endorsement.
Identity Management Overview
Meet you trainer
• Decade + experience in Identity management domain & technology
expertise
• Experienced in Sailpoint, Oracle, BMC, Microsoft, SUN Identity Management
Products
• Experience in Siteminder, Cyber Ark, SUN, Oracle access Management
products
• Worked with large scale Banks, Retail, Utilities, customers implementing
IAM Solutions
Why should you learn Identity Management?
• 91% increase in Cyber attacks since 2013
• 40% customers experienced a data breach or failed audit in 2014
• 1 in 7 employees might sell their login credentials for $150
• 89% believe there is more risk from inside
• Huge fines levied upon failed audits
• BYOD, BYOI, BYO….
• Security is the primary driver for IAM
* Few statistics are derived from Sailpoint’s webcast
Technology vs. Risk Understanding
• What is a CISCO L7 switch Capable of?
• What is a NAV Server and what all might you be able to do?
• Do you know the difference between a DDL & DML statement?
• How do you connect?
• In an enterprise?
• Out in the personal life?
• Do you understand Risk?
What does the training cover
• Identity Management
• Worldwide frauds
• Identity
• Financial
• SOx & HIPPA
• Other frameworks
• Concepts
What does the training cover …
• Lightweight Directory Access Protocol
• Users
• Groups
• Organizations
• Object classes
• Applications
• Real world applications
• Access managed by LDAP
What does the training cover …
• Middleware
• Application servers
• Web servers
• Capabilities
• Virtualization
• Concept
• Necessity
• Configurations
What does the training cover …
• Introduction to Oracle Identity Management
• Creating your own Virtual Machine
• Data Loading
• Catalog Build and Usage
• Security & Role Modelling
• UI Customization
• Approvals
• Sandboxes
• Disconnected Resources
What does the training cover …
• Attestations/Certifications
• BI reports
• Data Modeling
• Other certification products and their capabilities
Features
12
• Comprehensive training
• Lab material developed with baby steps for easy execution
• Empowers trainee to get onboard onto a live project
• Impeccable Functional Knowledge
• In-depth teaching of the product
• Tips & Tricks
• Email support for training content & exercises
13
ENH SMAC Solutions Private Limited
CIN: U72300TG2015PTC102410
ENH Customer Centric Private Limited
CIN: U74120TG2015PTC102446
ENH iSecure Private Limited
CIN: U72300TG2015PTC102440
#C103, NCC Urban, Gachibowli, Hyderabad – 500028
Phone: +91 9959 800 400
www.enhcorp.com

isecure's Identity Management Training Intro

  • 1.
  • 2.
    Disclaimer EnH ISecure PrivateLimited (iSecure) has custom created the course content for identity management using genuine & legal licenses. The courseware provided in the training contents has been written by the authorized and qualified content writers and technical writers of iSecure. Every care has been taken by the staff of iSecure in compilation of the data contained herein and in verification of its accuracy when published, however the content of this training course is subject to change without notice due to factors outside the control of iSecure and this courseware should, therefore, be used as a guide only. For example, the products referred to in this publication are continually improved through further research and development and this may lead to information contained in this courseware being altered without notice. Disclaimer: No Liability iSecure, its staff, or its Member Companies shall not be held liable for any improper or incorrect use of these courseware and assumes no responsibility for any user's use of them. In no event shall iSecure, its staff, or its Member Companies be liable for any direct, indirect, incidental, special, exemplary or consequential damages (including, but not limited to: loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of these training materials, even if advised of the possibility of such damage. Disclaimer: No Warranty Material in the courseware may include technical inaccuracies or typographical errors. Changes may be periodically incorporated into the courseware. Disclaimer: No unethical business iSecure, its staff, or its Member Companies shall not engage in any unethical means to support customers or subscribers of this training. iSecure, its staff, or its Member Companies shall not engage officially or on personal status supporting any unethical business means. Copyright © Information Unauthorized reproduction in whole or in part is an infringement of copyright. iSecure will actively pursue any breach of its copyright. ® Trademarks All product names, logos, and brands are property of their respective owners. All company, product and service names used in the courseware are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.
  • 3.
  • 4.
    Meet you trainer •Decade + experience in Identity management domain & technology expertise • Experienced in Sailpoint, Oracle, BMC, Microsoft, SUN Identity Management Products • Experience in Siteminder, Cyber Ark, SUN, Oracle access Management products • Worked with large scale Banks, Retail, Utilities, customers implementing IAM Solutions
  • 5.
    Why should youlearn Identity Management? • 91% increase in Cyber attacks since 2013 • 40% customers experienced a data breach or failed audit in 2014 • 1 in 7 employees might sell their login credentials for $150 • 89% believe there is more risk from inside • Huge fines levied upon failed audits • BYOD, BYOI, BYO…. • Security is the primary driver for IAM * Few statistics are derived from Sailpoint’s webcast
  • 6.
    Technology vs. RiskUnderstanding • What is a CISCO L7 switch Capable of? • What is a NAV Server and what all might you be able to do? • Do you know the difference between a DDL & DML statement? • How do you connect? • In an enterprise? • Out in the personal life? • Do you understand Risk?
  • 7.
    What does thetraining cover • Identity Management • Worldwide frauds • Identity • Financial • SOx & HIPPA • Other frameworks • Concepts
  • 8.
    What does thetraining cover … • Lightweight Directory Access Protocol • Users • Groups • Organizations • Object classes • Applications • Real world applications • Access managed by LDAP
  • 9.
    What does thetraining cover … • Middleware • Application servers • Web servers • Capabilities • Virtualization • Concept • Necessity • Configurations
  • 10.
    What does thetraining cover … • Introduction to Oracle Identity Management • Creating your own Virtual Machine • Data Loading • Catalog Build and Usage • Security & Role Modelling • UI Customization • Approvals • Sandboxes • Disconnected Resources
  • 11.
    What does thetraining cover … • Attestations/Certifications • BI reports • Data Modeling • Other certification products and their capabilities
  • 12.
    Features 12 • Comprehensive training •Lab material developed with baby steps for easy execution • Empowers trainee to get onboard onto a live project • Impeccable Functional Knowledge • In-depth teaching of the product • Tips & Tricks • Email support for training content & exercises
  • 13.
  • 14.
    ENH SMAC SolutionsPrivate Limited CIN: U72300TG2015PTC102410 ENH Customer Centric Private Limited CIN: U74120TG2015PTC102446 ENH iSecure Private Limited CIN: U72300TG2015PTC102440 #C103, NCC Urban, Gachibowli, Hyderabad – 500028 Phone: +91 9959 800 400 www.enhcorp.com