IBM Identity Governance and Intelligence Foundations (TW401G)
IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.
This course is designed for security professionals who administer IBM Identity Governance and Intelligence.
- Basic knowledge of information security concepts
- Basic knowledge of identity management and governance concepts and strategy
- Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
- Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
- Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
- Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
- Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
- Describe each type of certification campaign in IGI; configure and run certification campaigns
- Describe how the Process Designer module helps you design and define authorization processes
- Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements
Unit 1: Introduction to IBM Identity Governance and IntelligenceUnit 2: Deployment planning considerationsUnit 3: Managing the exchange of dataUnit 4: Role lifecycle managementUnit 5: Access risk control modelingUnit 6: Certification campaignsUnit 7: Workflow processesUnit 8: Reporting