course overview
download outline
Overview
This course guides learners through the process of adopting IBM Verify in their organization. It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Audience
IT personnel
Systems administrator
IT security architect
IT security deployment specialist
Skills Gained
In this course, you learn to do the following tasks:
Outline
This course covers how Verify can be adopted to protect and secure resources while serving as the unifying thread in a diverse identity fabric. The use cases originate from real-world engagements.
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.
Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.
All $ prices are in USD unless it’s a NZ or AU date
SPVC = Self Paced Virtual Class
LVC = Live Virtual Class
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.