TOC CRS IDAM SailPoint
TOC CRS IDAM SailPoint
Theory
2 Fundamentals of Networking
Practical
Theory
Practical
Theory
4 Fundamentals of Access Management
Practical
Theory
5 Fundamentals of Incident Management and Response
Practical
Theory
6 Fundamentals of security operations
Practical
Cybersecurity Foundation
Topics
2 Introduction to IAM
3 Importance of IAM
3.1 Why is IAM Important
3.2 What does IAM Provide to the Enterprise
3.3 How IAM Works?
3.4 IAM’s Role in Organizational Security
3.5 IAM and Compliance
4 Basics & Terminologies and Concepts in IAM
4.1 Basics
4.2 Terminologies
4.3 Security Assertion Markup Language
4.4 OAuth
4.5 OpenID Connect
4.6 Lightweight Directory Access Protocol
4.7 Active Directory
5 IAM in Enterprise and Cloud Environments
5.1 What is and Enterprise?
5.2 What is a Cloud?
5.3 Enterprise and Cloud
5.4 IAM in Enterprise Cloud
5.5 IAM and Compliance in Cloud
5.6 IAM and Directory Services in Cloud
6 IAM Architecture
6.1 Challenges of IAM
6.2 IAM Architecture
6.3 IAM Architecture – Typical Implementation
6.4 IAM Services to Enterprises
6.5 IAM Practices
6.6 IAM Architecture Example
6.7 IAM Architecture Implementation
7 IAM Lifecycle
7.1 What is Lifecycle
7.2 Lifecycle of IAM
7.3 Centralization of IAM
8 User Access Management
8.1 Users of Enterprise
8.2 Roles in Enterprise
8.3 Typical Roles in an Enterprise
8.4 Basics of User Access Management
8.5 Effective User Access Management
8.6 Examples of User Access Management
8.7 User Access Management Details
8.8 SSO and User Access Management
8.9 MFA and User Access Management
8.1 SAML and User Access Management
8.11 Active Directory and User Access Management
9 Privilege Access Management
9.1 What are Privileges?
9.2 What is Privilege Access Management
9.3 Workings of PAM
9.4 How is PAM different from IAM?
9.5 Benefits of PAM
10 Access Provisioning
10.1 What is Access Provisioning?
10.2 Types of Access Provisioning
10.3 Access Provisioning via SAML, SSO, OAuth or OpenID Connect
10.4 Comparing and Contrasting SSO, SAML, OAuth and OpenID Connect
10.5 Access Provisioning Best Practices
11 Multi-factor Authentication
11.1 Importance of MFA
11.2 Methods of Multi-Factor Authentication
11.3 Process and Cons of Factors in MFA
11.4 Best Practices
12 Session Management & Monitoring
12.1 What is Session Management?
12.2 What is Privileged Session Management?
12.3 Active Session Monitoring
12.4 Tools for Session Monitoring
12.5 Best Practices
13 User Activity Compliance
13.1 What is User Activity Compliance?
13.2 Benefits of User Activity Compliance
13.3 User Activity Monitoring Tools
13.4 Best Practices
14 Case Studies
14.1 Case Study 1
14.2 Case Study 2
15 Summary
16 Conclusion
Expected Outcomes
The learner should aware of IAM course contents
Learner should able to understand the IAM concepts in Cybersecurity space and how does it enable us to securely control
to enterprise resources.
Learner should be clear with Identities and it's access to systems through policies and technologies to ensure that the righ
have the appropriate access to enterprise resources.
Learner should be clear with various IAM components like authentication, authorization, governance, directory services us
Mgmt, request Mgmt, reporting and analytics.
- Should able to demonstrate IAM concepts and its importance in Cybersecurity space and how does IAM helps organiza
secure enterprise resources.
- Clear understanding about how IAM helps organization to meet various security compliances requirements like SOX, G
HIPAA etc.
- Should able to demonstrate the IAM system components and services offering to secure enterprise resources with on
premise/cloud environment."
- Should have clear understanding about various open standard protocols which supports Authentication & Authorizatio
services across resources.
- Should be familiar with Identity Lifecycle, Access Management through JML process, User access request management
connected/disconnected system onboarding either through OOB or custom connectors.
SAILPOINT IDENTITYIQ SYLLABUS
Topics
PREVIEW ON IDENTITY IQ
CERTIFICATIONS
ABOUT ROLES
CONCEPTS OF TROUBLESHOOTING, DEBUG, CONSOLE
REPORTING
INTRODUCTION TO WORKFLOW
INTRODUCTION TO PROVISIONING BROKER & ENGINE
OVERVIEW ON PERFORMANCE
• DEFINITION OF ROLE
• BENEFITS OF ROLE MANAGEMENT
• OVERVIEW ON ROLE MODEL
• ABOUT ROLE MINING
• ROLE MANAGEMENT POINTERS
• CONCEPTS AND FACTORS IN SUCCESSFUL TROUBLESHOOTING & DEBUGGING
• LOGGING, OPTIONS & THE CONFIGURATION
• DEBUG OF PAGE
• BEST PRACTICES
• CHANGE IN LIFECYCLE
• KEY FEATURE & CONSIDERATIONS
• ACCESS REQUEST PROCESS
• ADDITION ACCESS & IDENTITY MANAGEMENT OPTIONS
• ABOUT LCM CONFIGURATION
• OTHER ADDITIONAL LCM FUNCTIONALITY
• WHAT IS A WORKFLOW?
• CONCEPTS OF WORKFLOWS IN IDENTITY IQ
• KEY WORKFLOW _CONCEPTS
• WORKFLOW CASE, VARIABLES, STEPS & APPROVALS
• WORKFLOW_ TROUBLESHOOTING CONCEPTS
• PROVISIONING ARCHITECTURE
• OBJECT MODEL INVOLVED IN THE PROVISIONING
• CONCEPTS OF CONNECTORS
• WALKTHROUGH OF THE PROVISIONING PROCESS
• DEBUGGING CONCEPTS