course overview
download outline
Overview
In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine. First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you are setting up the Reverse Proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.
Audience
IT Personnel, System Administrator, IT Security Architect, IT Security Deployment Specialist
Skills Gained
In this course, you learn to do the following tasks:
Outline
Gain foundational Verify Access skills covering architecture, user management, access control mechanisms, Reverse Proxy capabilities, as well as logging, auditing, and troubleshooting.
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.
Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.
All $ prices are in USD unless it’s a NZ or AU date
SPVC = Self Paced Virtual Class
LVC = Live Virtual Class
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.