SlideShare a Scribd company logo
1 of 11
Download to read offline
Course description
Sailpoint IdentityIQ is the leading Identity & Access Management
solution provider with a global adoption rate of 75%, with its integrated
governing systems that delivers specific Identity Governance
capabilities like compliance control, access request, provisioning, and
password management in application in leading organizations across
the world. Grab fundamental concepts and skills necessary to
administer and develop in the SailPoint IdentityIQ software ecosystem
and take your career prospects to the next possible level. Gain essential
SailPoint developer skills while complementing the same with effective
administration knowledge to strengthen your conceptual and practical
understanding of the platform.
Our Sailpoint IdentityIQ Implementation & Developer training program is
specially designed with three key modules to train your skills effectively,
Implementation, Administration & Development essentially prepping you
for a wide array of SailPoint roles. Get additional downloadable resources,
SailPoint Documents, Cloud VMs and virtual machines that are necessary
for enhancing or complementing your learning experience. Upon
successful completion of this course, you will be eligible for a wide array
of SailPoint jobs like SailPoint IIQ developer, SailPoint Administrator,
SailPoint IIQ expert, etc.
www.infosectrain.com | sales@infosectrain.com 01
Understand the concepts and components of the IdentityIQ architecture
and its key features, explore the application on-boarding process and
correlation; train about executive troubleshooting, debugging and
control; learn to smoothly go through workflows, reports, provisioning
broker, and engine and build your true SailPoint IIQ capabilities. These
skills are highly crucial in bagging that lucrative SailPoint role that youโ€™re
eyeing for yourself! Also, we have added a 4 hours long Interview session
at the end of this program that will train you in essential SailPoint
Interview questions and answers and make you completely job-ready.
Currently, SailPoint is both a Pathfinder and a Market Leader in the global
Identity & Access Management space while delivering high level solutions
enhancing identity governance, operational efficiency, security delivery,
etc. to enterprises with complicated security environments. This SailPoint
IdentityIQ course or SailPoint IIQ course is designed to uplift your career
prospects in the Identity Management field with its leading tool!
www.infosectrain.com | sales@infosectrain.com 02
www.infosectrain.com | sales@infosectrain.com 03
SailPoint Certification Training is suitable for anyone who is willing to get
through the certification exam. If you are::
Our SailPoint course will prove to be truly beneficial for you.
โ€ข An aspirant looking forward to start the career in SailPoint
โ€ข A professional who want to change the career domain to identity and
access management (IAM)
โ€ข A Tester
โ€ข A Software developer
โ€ข IdentityIQ login and access management knowledge and
โ€ข Java and MySQL programming languages knowledge.
There are no prerequisites for SailPoint IdentityIQ Training but it is
recommended to have
Target Audience
Prerequisites
www.infosectrain.com | sales@infosectrain.com 04
Why Infosec Train?
Certified &
Experienced Instructor
Flexible Schedule Access to the
recorded
sessions
Tailor Made Training 4 hrs/day in
Weekend/
Weekday
Post Training
Support
www.infosectrain.com | sales@infosectrain.com 05
$140,000
$120,000
$100,000
$80,000
$60,000
$40,000
$20,000
0
S
a
i
l
P
o
i
n
t
D
e
v
e
l
o
p
e
r
S
a
i
l
P
o
i
n
t
E
n
g
i
n
e
e
r
S
a
i
l
P
o
i
n
t
S
o
l
u
t
i
o
n
A
r
c
h
i
t
e
c
t
$94,526
$91,923
$1,05,854
$1,31,047
I
d
e
n
t
i
t
y
a
n
d
A
c
c
e
s
s
M
a
n
a
g
e
m
e
n
t
E
n
g
i
n
e
e
r
Source: Glassdoor
Hiring companies
Sailpoint Career Bene๏ฌts
This Sailpoint IdentityIQ Implementation & Developer Training program
is divided into two parts, Part 1 or Administration & Part 2 or Development
for better comprehension and insight.
Part 1 of Training Administrator
IAM overview and Its Key concepts, Product Architecture - Installation
- Deployment, Overview and Product Architecture,Implementing Risks
and Policies, Certifications, Roles, Troubleshooting, Debug, Console,
Reporting, Lifecycle Manager
Part 2 of Training Developer
Introduction to Workflows, IdentityIQ Default Workflows, Workflows
Operation, Creation and modifying Workflows, Process Editor Tabs,
Accessing the XML, XML Content, Reference Syntax, Monitoring
Workflows, Components of a Form, Defining Custom Forms, Forms
Models, Form Examples, Overview of QuickLinks, DynamicScope,
QuickLinkOption, Filter Strings and Values for search, Sailpoint Object
Model, Walk through Sailpoint database, Custom Rules (Query
Sailpoint objects),Certification Rules (Exclusions / Pre delegation),
Object Exporter,Workgroup Exporter / Importer
1. SailPoint Training Course Topics
โ€ข IdentityIQ Business Purpose
โ€ข IdentityIQ Overview
โ€ข IdentityIQ Common Components
โ€ข Overview of an IdentityIQ Project
www.infosectrain.com | sales@infosectrain.com 06
Course Content
www.infosectrain.com | sales@infosectrain.com 07
2. Product Architecture - Installation - Deployment
โ€ข Understanding the Product Architecture
โ€ข Understanding the Installation Procedure for IdentityIQ
โ€ข Understanding the Installation Procedure for SailPoint IdentityIQ
Patching
OVERVIEW AND PRODUCT ARCHITECTURE
E X E R C I S E 1
โ€ข Identity Cube Overview
โ€ข Applications/Connectors
โ€ข Identity Mappings
โ€ข Aggregation of Data
โ€ข Capabilities/Scoping/Workgroups
1. Identity cubes
โ€ข On-boarding Applications
โ€ข Account Correlation, Manager Correlation
โ€ข Application Configuration
2. Application On-boarding, Correlation
www.infosectrain.com | sales@infosectrain.com 08
RISKS & POLICIES
E X E R C I S E 2
โ€ข IdentityIQ Policy Overview
โ€ข Policy Types
โ€ข Defining Policies
โ€ข Discovering and Handling Policy Violations
โ€ข Identity Risk Model
โ€ข Refreshing and Interaction with Risk scores
1. Risks & Policies
CERTIFICATIONS
E X E R C I S E 3
โ€ข Certifications and Access Reviews
โ€ข Types of Certifications
โ€ข Certification Lifecycle
โ€ข Certification Configuration
โ€ข Making Certification Decisions
โ€ข Certification Decisions
1. Certifications
RBAC - ROLES
E X E R C I S E 4
โ€ข Role Definition
โ€ข Role Management Benefits
โ€ข Role Model Overview
โ€ข Role Mining
โ€ข Role Management Pointers
1. Roles
www.infosectrain.com | sales@infosectrain.com 09
TROUBLESHOOTING, DEBUG, CONSOLE
E X E R C I S E 5
โ€ข Factors in successful Troubleshooting and Debugging
โ€ข Logging, Options and Configuration
โ€ข Debug Page
โ€ข Best Practices
โ€ข Reporting Architecture of SailPoint IIQ
1. Troubleshooting, Debug, Console
REPORTING
E X E R C I S E 6
โ€ข Defining Data Sources
โ€ข Report Column Configuration
โ€ข Query Configuration
1. Reporting
LIFECYCLE MANAGER
E X E R C I S E 7
โ€ข Change Lifecycle
โ€ข Key feature and Considerations
โ€ข Access Request Process
โ€ข Addition Access and Identity
Management Options
โ€ข LCM Configuration
โ€ข Additional LCM functionality
1. Lifecycle Manager
โ€ข What is a Workflow?
โ€ข Workflows in IdentityIQ
โ€ข Key Workflow Concepts
โ€ข Workflow case, variables, steps
and approvals
โ€ข Workflow Troubleshooting
2. WorkFlow
www.infosectrain.com | sales@infosectrain.com

More Related Content

Similar to Sailpoint_IdentityIQ_Implementation__Developer_Training_Program.pdf

CURRICULUM_VITAE_new_02_11_2015
CURRICULUM_VITAE_new_02_11_2015CURRICULUM_VITAE_new_02_11_2015
CURRICULUM_VITAE_new_02_11_2015
Sidhartha Chatterjee
ย 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
ssuserde23af
ย 
Abey_Thomas_Resume
Abey_Thomas_ResumeAbey_Thomas_Resume
Abey_Thomas_Resume
Abey Thomas
ย 
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SRS.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
Bakthavatchalam Subramani
ย 

Similar to Sailpoint_IdentityIQ_Implementation__Developer_Training_Program.pdf (20)

Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
ย 
lean management training
lean management traininglean management training
lean management training
ย 
Lean Manufacturing
Lean Manufacturing Lean Manufacturing
Lean Manufacturing
ย 
CURRICULUM_VITAE_new_02_11_2015
CURRICULUM_VITAE_new_02_11_2015CURRICULUM_VITAE_new_02_11_2015
CURRICULUM_VITAE_new_02_11_2015
ย 
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
ย 
isecure's Identity Management Training Intro
isecure's Identity Management Training Introisecure's Identity Management Training Intro
isecure's Identity Management Training Intro
ย 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
ย 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
ย 
Belfast Training & Certification Brochure
Belfast Training & Certification BrochureBelfast Training & Certification Brochure
Belfast Training & Certification Brochure
ย 
Dublin Training & Certification Brochure
Dublin Training & Certification BrochureDublin Training & Certification Brochure
Dublin Training & Certification Brochure
ย 
Planning Your Migration to the Lightning Experience
Planning Your Migration to the Lightning ExperiencePlanning Your Migration to the Lightning Experience
Planning Your Migration to the Lightning Experience
ย 
Think Careers - Company Profile
Think Careers - Company ProfileThink Careers - Company Profile
Think Careers - Company Profile
ย 
Abey_Thomas_Resume
Abey_Thomas_ResumeAbey_Thomas_Resume
Abey_Thomas_Resume
ย 
SAP HCM Consultant at HCL Technologies
SAP HCM Consultant at HCL TechnologiesSAP HCM Consultant at HCL Technologies
SAP HCM Consultant at HCL Technologies
ย 
Ansari Waheed CV - Galaxy IT Services
Ansari Waheed CV - Galaxy IT ServicesAnsari Waheed CV - Galaxy IT Services
Ansari Waheed CV - Galaxy IT Services
ย 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
ย 
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SRS.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
S.Baktha-QA-Process-Audits-Security-Services- 25 Nov 2016 SR
ย 
How Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the WorkplaceHow Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the Workplace
ย 
ITILยฎ INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITILยฎ INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLSITILยฎ INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITILยฎ INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ย 
One cloud platform - Endless benefits - Hire to ROI
One cloud platform - Endless benefits - Hire to ROIOne cloud platform - Endless benefits - Hire to ROI
One cloud platform - Endless benefits - Hire to ROI
ย 

More from Infosec train

๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
Infosec train
ย 
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
Infosec train
ย 

More from Infosec train (20)

Threat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategyThreat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategy
ย 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
ย 
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats."Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
ย 
Cybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffffCybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffff
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
ย 
Join us this May for a series of FREEevents
Join us this May for a series of FREEeventsJoin us this May for a series of FREEevents
Join us this May for a series of FREEevents
ย 
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
ย 
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
ย 
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
ย 
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
ย 
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
ย 
TOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdfTOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdf
ย 
The Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdfThe Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdf
ย 
Penetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdfPenetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdf
ย 
International Olympic Association and the International Olympic Committee
International Olympic Association and the International Olympic CommitteeInternational Olympic Association and the International Olympic Committee
International Olympic Association and the International Olympic Committee
ย 
Indiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdfIndiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdf
ย 
Exploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdfExploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdf
ย 
Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...
ย 
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
ย 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
ย 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
ย 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
ย 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
ย 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ย 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
ย 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
ย 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
ย 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
ย 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
ย 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
ย 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
ย 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
ย 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
ย 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
ย 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
ย 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
ย 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
ย 

Sailpoint_IdentityIQ_Implementation__Developer_Training_Program.pdf

  • 1.
  • 2. Course description Sailpoint IdentityIQ is the leading Identity & Access Management solution provider with a global adoption rate of 75%, with its integrated governing systems that delivers specific Identity Governance capabilities like compliance control, access request, provisioning, and password management in application in leading organizations across the world. Grab fundamental concepts and skills necessary to administer and develop in the SailPoint IdentityIQ software ecosystem and take your career prospects to the next possible level. Gain essential SailPoint developer skills while complementing the same with effective administration knowledge to strengthen your conceptual and practical understanding of the platform. Our Sailpoint IdentityIQ Implementation & Developer training program is specially designed with three key modules to train your skills effectively, Implementation, Administration & Development essentially prepping you for a wide array of SailPoint roles. Get additional downloadable resources, SailPoint Documents, Cloud VMs and virtual machines that are necessary for enhancing or complementing your learning experience. Upon successful completion of this course, you will be eligible for a wide array of SailPoint jobs like SailPoint IIQ developer, SailPoint Administrator, SailPoint IIQ expert, etc. www.infosectrain.com | sales@infosectrain.com 01
  • 3. Understand the concepts and components of the IdentityIQ architecture and its key features, explore the application on-boarding process and correlation; train about executive troubleshooting, debugging and control; learn to smoothly go through workflows, reports, provisioning broker, and engine and build your true SailPoint IIQ capabilities. These skills are highly crucial in bagging that lucrative SailPoint role that youโ€™re eyeing for yourself! Also, we have added a 4 hours long Interview session at the end of this program that will train you in essential SailPoint Interview questions and answers and make you completely job-ready. Currently, SailPoint is both a Pathfinder and a Market Leader in the global Identity & Access Management space while delivering high level solutions enhancing identity governance, operational efficiency, security delivery, etc. to enterprises with complicated security environments. This SailPoint IdentityIQ course or SailPoint IIQ course is designed to uplift your career prospects in the Identity Management field with its leading tool! www.infosectrain.com | sales@infosectrain.com 02
  • 4. www.infosectrain.com | sales@infosectrain.com 03 SailPoint Certification Training is suitable for anyone who is willing to get through the certification exam. If you are:: Our SailPoint course will prove to be truly beneficial for you. โ€ข An aspirant looking forward to start the career in SailPoint โ€ข A professional who want to change the career domain to identity and access management (IAM) โ€ข A Tester โ€ข A Software developer โ€ข IdentityIQ login and access management knowledge and โ€ข Java and MySQL programming languages knowledge. There are no prerequisites for SailPoint IdentityIQ Training but it is recommended to have Target Audience Prerequisites
  • 5. www.infosectrain.com | sales@infosectrain.com 04 Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions Tailor Made Training 4 hrs/day in Weekend/ Weekday Post Training Support
  • 6. www.infosectrain.com | sales@infosectrain.com 05 $140,000 $120,000 $100,000 $80,000 $60,000 $40,000 $20,000 0 S a i l P o i n t D e v e l o p e r S a i l P o i n t E n g i n e e r S a i l P o i n t S o l u t i o n A r c h i t e c t $94,526 $91,923 $1,05,854 $1,31,047 I d e n t i t y a n d A c c e s s M a n a g e m e n t E n g i n e e r Source: Glassdoor Hiring companies Sailpoint Career Bene๏ฌts
  • 7. This Sailpoint IdentityIQ Implementation & Developer Training program is divided into two parts, Part 1 or Administration & Part 2 or Development for better comprehension and insight. Part 1 of Training Administrator IAM overview and Its Key concepts, Product Architecture - Installation - Deployment, Overview and Product Architecture,Implementing Risks and Policies, Certifications, Roles, Troubleshooting, Debug, Console, Reporting, Lifecycle Manager Part 2 of Training Developer Introduction to Workflows, IdentityIQ Default Workflows, Workflows Operation, Creation and modifying Workflows, Process Editor Tabs, Accessing the XML, XML Content, Reference Syntax, Monitoring Workflows, Components of a Form, Defining Custom Forms, Forms Models, Form Examples, Overview of QuickLinks, DynamicScope, QuickLinkOption, Filter Strings and Values for search, Sailpoint Object Model, Walk through Sailpoint database, Custom Rules (Query Sailpoint objects),Certification Rules (Exclusions / Pre delegation), Object Exporter,Workgroup Exporter / Importer 1. SailPoint Training Course Topics โ€ข IdentityIQ Business Purpose โ€ข IdentityIQ Overview โ€ข IdentityIQ Common Components โ€ข Overview of an IdentityIQ Project www.infosectrain.com | sales@infosectrain.com 06 Course Content
  • 8. www.infosectrain.com | sales@infosectrain.com 07 2. Product Architecture - Installation - Deployment โ€ข Understanding the Product Architecture โ€ข Understanding the Installation Procedure for IdentityIQ โ€ข Understanding the Installation Procedure for SailPoint IdentityIQ Patching OVERVIEW AND PRODUCT ARCHITECTURE E X E R C I S E 1 โ€ข Identity Cube Overview โ€ข Applications/Connectors โ€ข Identity Mappings โ€ข Aggregation of Data โ€ข Capabilities/Scoping/Workgroups 1. Identity cubes โ€ข On-boarding Applications โ€ข Account Correlation, Manager Correlation โ€ข Application Configuration 2. Application On-boarding, Correlation
  • 9. www.infosectrain.com | sales@infosectrain.com 08 RISKS & POLICIES E X E R C I S E 2 โ€ข IdentityIQ Policy Overview โ€ข Policy Types โ€ข Defining Policies โ€ข Discovering and Handling Policy Violations โ€ข Identity Risk Model โ€ข Refreshing and Interaction with Risk scores 1. Risks & Policies CERTIFICATIONS E X E R C I S E 3 โ€ข Certifications and Access Reviews โ€ข Types of Certifications โ€ข Certification Lifecycle โ€ข Certification Configuration โ€ข Making Certification Decisions โ€ข Certification Decisions 1. Certifications RBAC - ROLES E X E R C I S E 4 โ€ข Role Definition โ€ข Role Management Benefits โ€ข Role Model Overview โ€ข Role Mining โ€ข Role Management Pointers 1. Roles
  • 10. www.infosectrain.com | sales@infosectrain.com 09 TROUBLESHOOTING, DEBUG, CONSOLE E X E R C I S E 5 โ€ข Factors in successful Troubleshooting and Debugging โ€ข Logging, Options and Configuration โ€ข Debug Page โ€ข Best Practices โ€ข Reporting Architecture of SailPoint IIQ 1. Troubleshooting, Debug, Console REPORTING E X E R C I S E 6 โ€ข Defining Data Sources โ€ข Report Column Configuration โ€ข Query Configuration 1. Reporting LIFECYCLE MANAGER E X E R C I S E 7 โ€ข Change Lifecycle โ€ข Key feature and Considerations โ€ข Access Request Process โ€ข Addition Access and Identity Management Options โ€ข LCM Configuration โ€ข Additional LCM functionality 1. Lifecycle Manager โ€ข What is a Workflow? โ€ข Workflows in IdentityIQ โ€ข Key Workflow Concepts โ€ข Workflow case, variables, steps and approvals โ€ข Workflow Troubleshooting 2. WorkFlow