0% found this document useful (0 votes)
190 views1 page

GRC 10.0 - Access Control Course Syllabus: ARA (Access Risk Analysis)

This document outlines the course syllabus for a 25-hour GRC 10.0 – Access Control training delivered over 1.5 hour class sessions. The training will cover topics such as the introduction of the GRC 10.0 suite, access risk analysis, access request management, emergency access management, business role management, and migrating from GRC 5.3 to 10.0. Specific topics within each module include installing GRC 10.0, rule set designing, provisioning settings, and maintaining workflow configurations.

Uploaded by

nizartcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views1 page

GRC 10.0 - Access Control Course Syllabus: ARA (Access Risk Analysis)

This document outlines the course syllabus for a 25-hour GRC 10.0 – Access Control training delivered over 1.5 hour class sessions. The training will cover topics such as the introduction of the GRC 10.0 suite, access risk analysis, access request management, emergency access management, business role management, and migrating from GRC 5.3 to 10.0. Specific topics within each module include installing GRC 10.0, rule set designing, provisioning settings, and maintaining workflow configurations.

Uploaded by

nizartcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

GRC 10.

0 Access Control Course syllabus


Course duration: 25 hours
Class duration: 1.5 hours
Training mode: Live Instructor led online training

Introduction of GRC 10.0 Suite


SOD & SOX Concept Explanation
Difference between GRC10.0 to Other GRC Versions
Introduction on new components in GRC10.0
Installation of GRC 10.0
Post Installation Steps

ARA (Access Risk Analysis)

Rule Set Designing


Risk Analysis on Different Levels
Remediation Process
Mitigation Process
Background Jobs Scheduling

ARM (Access Request Management)

Activate BC sets
Connector settings
Provision Settings
End User Personalization Forms
Maintaining MSMP Workflow
Create an Access Request

EAM (Emergency Access Management)

Emergency Access Management Configuration


Maintain Owners and Controllers in Central Owner Maintenance
Assign Owners to Firefighter IDs
Assign Controllers to Firefighter IDs
Assign Firefighter Users to Firefighter IDs
Maintain Reason Codes
Launch FF session
Review a Log Report

BRM (Business Role Management)

Configuring Role Management


Configuring Role Methodology
Settings for Condition Groups
Maintain Owners for Role Management
Create a Single Role
GRC Access Control Migration from 5.3 to 10.0

You might also like