h12172 Ds Rsa Education Services Catalog

Embed Size (px)

Citation preview

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    1/81

    S e r v i c e s C a t a l o g –   Q 4 2 0 1 5

    RSA CUSTOMER EDUCATION CATALOG

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    2/81

    COURSE DESCRIPTION INDEX

    RSA, The Security Division of EMC  2

    Identity and AccessManagement

    RSA Access Manager Administration, Installation and Configuration ........................................... 9

    RSA Via Lifecycle and Governance Administration ..................................................................... 11

    RSA Business Role Manager ..................................................................................................... 13 RSA Data Access Governance Basics ........................................................................................ 15 RSA Authentication Manager Administration ............................................................................. 16

    RSA Authentication Manager Installation and Configuration ...................................................... 18RSA SecurID Help Desk Basics ..................................................................................................20

    RSA Authentication Manager 6.1 to 8.x Data Migration ...................... ........................................ 22Migrating RSA Authentication Manager v6.1 to a v8.1 Hardware Appliance ................................. 22RSA Authentication Manager 7.1 to 8.x Data Migration ..................................................... .......... 24Migrating RSA Authentication Manager v7.1 to a v8.1 Hardware Appliance ................................. 24 

    Governance, Risk andCompliance

    Getting Started with Enterprise Risk Management .....................................................................26

    Getting Started with Policy and Compliance Management .........................................................28GRC Overview .......................................................................................................................... 30 RSA Archer Administration ................................................................ ........................................ 31 

    RSA Archer Advanced Administration ........................................................................................ 33RSA Archer Solutions Overview ........................................................ ........................................ 35 

    RSA Archer Security Operations (SecOps) Management Essentials ............................................. 37 RSA Archer Security Operations (SecOps) Management Solution Basics .................................... 39 RSA Archer Custom End-User Training Service ..................................................... ..................... 41 

     AdvancedSecurity Operations

    RSA Data Loss Prevention Administration.......................................... ........................................ 43 RSA ECAT Fundamentals ........................................................ ................................................... 45 RSA Security Analytics Introduction ............................................................. ............................. 47 

    RSA Security Analytics 10.5 What’s New Overview ....... .............................................................. 49

    RSA Security Analytics Foundations ..................................................................... ..................... 50RSA Security Analytics Core Administration ............................................................. .................. 52

    RSA Security Analytics Hunting ................................................................................................. 54 

    RSA Security Analytics Introduction to Troubleshooting for Customers ....................................... 56 

     Anti Fraud

    RSA Adaptive Authentication On-Premise Administration ....... ................................................... 58

    RSA Adaptive Authentication for eCommerce Back Office Tools ....................................... ......... 60

    RSA Adaptive Authentication 12 Migration ................................................................................62 RSA Web Threat Detection Essentials ........................................................................................64 

    Cyber Defense

    RSA Intelligence-Driven Event Analysis..................................................................................... 66RSA Incident Handling and Response ...................................................................................... 68RSA Threat Intelligence .......................................................... ................................................... 70

    RSA Malware Analysis .............................................................................................................. 72 RSA SOC Simulation Challenge ................................................................................................. 74RSA Cyber Defense Workshop ........................................................... ........................................ 75 

    Security Concepts andPrinciples

    RSA Security Awareness Program ................................................................ .............................. 77 RSA CISSP Certification Boot Camp ........................................................................................... 79

    Learning Assessments RSA Learning Assessments ............................................................... ....................................... 80

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    3/81

     

    RSA, The Security Division of EMC  3

    The Value of

    Professional Education

    Investing in training and education

    makes good business sense and can

    have a profound impact on your

    team. It enables an organization to:

    – Decrease operating costs and

    increase productivity

    – Reduce technical infrastructure

    costs

    – Increase effectiveness of your

    technology investment

    – Reduce your organization’s overall

    information risk 

    How to Contact Us

    Online www.emc.com/rsa-training

    E-mail [email protected]

    Phone: 800-995-5095

    International: 781-515-7700

    Fax: 781-515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730 USA

    ENABLE YOUR TEAM TODAY FOR TOMORROW’S IT SECURITY CHALLENGES

    RSA Education Services provides practical and relevant courses that

    support security learning across an enterprise. Properly trained

    personnel are the lifeblood of any organization. As you implement

    new technologies, add new functionality to existing systems or orient

    new staff, education is a key element. Consistent and focused traininghelps maintain the security of your computing environment, improves

    the end user experience and increases productivity and job

    satisfaction among your staff.

    NEW OFFERINGS

    RSA Security Analytics 

    RSA Security Analytics courses have been updated for product version

    10.5 and are now available as the following courses:

      RSA Security Analytics Introduction (eLearning) [see page 47 ] 

      RSA Security Analytics 10.5 What’s New Overview [see page 49]

     

    RSA Security Analytics Foundations [see page 50]   RSA Security Analytics Core Administration [see page 52] 

      RSA Security Analytics Introduction to Troubleshooting for Customers

    [see page 56]

    And, with expected availabilty in late Q4, 2015:

    RSA Security Analytics Hunting [see page 54].

    RSA Via Lifecycle and Governance 

    The former RSA IMG Administration course has been revised in line

    with the introduction of the RSA Via Lifecycle and RSA Via Governance

    platforms. [see page 11] 

    RSA Archer 

    Two eLearning courses have been added to our offerings: 

    GRC Overview [see page 30] 

     

    RSA Archer Solutions Overview [see page 35 ] 

    FLEXIBLE DELIVERY OPTIONS

    Instructor-Led Training (ILT)

    Instructor-led classes offer comprehensive training in a fully-

    equipped RSA Learning Center. Public classes give you the

    opportunity to interact with your peers, further enhancing your

    learning experience by sharing real-world tips and best practices.

    Video Instructor Led Training (Video ILT) Video ILT courses combine the best of instructor-delivered lectures

    and presentations with the convenience and flexibility of an on-

    demand learning format. Video ILT programs are delivered in

    streaming format and can be viewed by the student directly on their

    own computer with an internet connection.

    Online Instructor-Led Training (Online ILT) 

    Online ILT provides real-time, interactive, virtual training where

    students participate online to access the instructor-led virtual

    classroom. Lecture, discussion, questions and answers, and lab

    exercises makes this a flexible training experience.

    eLearning 

    Self-paced eLearning provides you with training that is generally one

    to three hours in length giving you the convenience of learning at

    your own pace.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    4/81RSA, The Security Division of EMC 4

    RSA PRODUCT TRAINING

    Our worldwide training services are targeted to serve professionals

    who are responsible for installing, supporting and administering the

    entire range of RSA solutions.

    Developed for security administration and network operations, the

    product courses offer a variety of teaching methods including

    traditional instructor-led and virtual (“on line”) instructor-led training,

    video-based learning, and elearning. Instructor-led courses can alsobe made available as on-site engagements at a customer’s location.

    Each of these options gives you the flexibility to select a learning

    mode that best fits your learning style, time constraints and budget.

    RSA SECURITY AWARENESS PROGRAMS

    RSA’s Security Awareness programs offer ways to test and measure

    vulnerability, then provide essential education to fill any gaps. Our

    Security Awareness training can target virtually every level of an

    organization – raising awareness and offering concrete steps to effect

    change, thus helping to prevent attackers from gaining a footholdthrough unsuspecting targets.

    See individual program descriptions for further details.

    CYBER DEFENSE TRAINING COURSES FORSECURITY ANALYSTS

    The threat landscape is becoming more complicated every day. With

    the advent and enhancement of technical innovations like cloud

    computing, social media, mobile devices and big data, organizations

    are finding it very difficult to keep ahead of advanced threats.

    Security products, while necessary, can only go so far in identifying

    and mitigating potential breaches. A skilled security analyst is key tothe success of any Information Security strategy.

    The RSA Cyber Defense Training courses address these challenges by

    offering comprehensive training on analytic processes and techniques

    that are independent of a specific attack technique or security

    product. These courses focus on analysis skills that are directly

    relevant to the current security climate. The curriculum also provides

    a path for security analysts to advance their skills by offering an

    approach based on roles that are generally consistent with the roles

    and responsibilities of a SOC.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    5/81RSA, The Security Division of EMC 5

    Benefits of Onsite

    Training

    Substantial cost Savings

    – Save up to 40% compared to

    individual public class rates

    Less student down time

    – Reduce travel concerns and

    out-of-office time

    Convenient, Flexible

    Scheduling

    – Your training can be scheduled

    at the time and location most

    convenient for you

    Benefits of Online

    Instructor-led Training

    – No travel cost or travel time

    – Live instructor with whom you

    can interact and ask questions

    – Same content as the classroom

    version of the course withhands-on labs to reinforce

    concepts

    – Modest connectivity

    requirements allow participation

    from anywhere

    – Publicly-scheduled classes for

    individual participants or Private

    sessions for organizations

    that prefer virtual training for

    their dispersed teams

    ONSITE TRAINING

    With RSA Onsite training, you and your people aren’t locked into a

    pre-existing schedule of public classes at a pre-existing location. RSA

    Education Services can work with you to schedule your training at the

    time and location that’s most convenient for you. That means training

    doesn’t have to conflict with your other business priorities – and it can

    be timed precisely to support your RSA implementation.

    RSA Onsite training rates can save an organization up to 40% whencompared to individual student rates. Additional cost savings are

    realized by eliminating the need for student travel. What’s more, since

    your students are not preparing for trips – or making their way back

    from airports after training – they are likely to be more productive and

    accessible in the days surrounding their training experience.

    ONLINE INSTRUCTOR-LED TRAINING

    What is Online ILT? 

    Online ILT is real-time virtual training conducted remotely by RSA

    instructors. It’s virtual training that mirrors the classroom experience

    with:

    Live web casts. During scheduled web casts, students communicate

    with their RSA instructor and other students, ask questions, and

    experience RSA products through live demonstration.

    Hands-on labs. Students access a remote lab environment that

    enables them to interact with RSA software and practice what

    they’ve learned. 

    Course materials. Course materials are shipped to participants in

    advance of the class. Just like in a classroom, students use these

    materials under the guidance of the instructor.

    Instructor guidance. During class time, students have the benefit of

    the instructor’s expertise to assist during the live web casts andHands-on Labs. During lab time, the instructor can shadow students

    by virtually looking over the shoulder of each student to evaluate

    their progress and provide assistance.

    RSA LEARNING ASSESSMENTS

    As organizations increasingly depend on technology to manage their

    businesses, the need for employees to be knowledgeable about

    security is increasingly evident. Whether they are IT security

    professionals or general office staff, having the appropriate security

    knowledge and skills to perform their jobs is a critical business driver.

    To plan and position your security training initiatives cost-effectively,RSA Learning Assessments are tools to measure your team’s

    knowledge of RSA products and other security-related concepts. Based

    on the learning assessment results, we can work with you to identify a

    learning program that works for you and your team.

    RSA Learning Assessments are useful for organizations who recognize

    a need for training but aren’t quite sure what training their team really

    needs. By leveraging RSA Learning Assessments, you can better

    understand the learning gaps and make an informed decision about

    the most effective individual and group training plans for your team.

    Online RSA Learning Assessments are available to you at no charge.

    An assessment can be completed within 15-20 minutes withimmediate results provided to the assessment taker. For a team

    assessment, management reports can be provided that evaluates

    individual and group results.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    6/81RSA, The Security Division of EMC 6

    RSA Training Unit

    Details:

    – Each Training Unit has a value

    of $100 US

    – Valid for customers and

    partners in all regions

    – Can be used to register one or

    more individuals– Can be redeemed for any RSA

    course and any delivery mode

    – Valid for one year (364 days)

    from time of issuance. Any

    unused days are null and void

    after the expiration date

    – Payment can be made with:

    purchase order, credit card, or

    company check

    Registration and

    Payment

    Please complete your

    registration at

    www.emc.com/rsa-training. Be

    sure you register with the e-mail

    address of the student attending

    class, as this is the only unique

    identifier we have for each

    student.

    Complete details regarding

    payment by purchase order,

    credit card or check are provided

    on our web site.

    RSA TRAINING UNITS

    Training is an invaluable means of facilitating growth in your

    organization and increasing the skills and knowledge of your

    employees. With RSA Training Units (TUs) you can invest in RSA

    courses and use them whenever RSA training is necessary.

    Training units are simply RSA Education Services currency. They are

    deposited into a company’s training account and are available for

    general consumption by your company’s employees. Valid for oneyear from date of purchase, pre-paid TUs provide maximum flexibility

    to ensure your team’s readiness.

    With RSA TUs you can satisfy your training requirements as they

    evolve throughout the year. You reduce the paperwork and approvals

    associated with multiple enrollments by taking care of all your training

    needs with a single purchase.

    RSA CERTIFIED SECURITY PROFESSIONALCERTIFICATION

    By becoming an RSA Certified Security Professional, you possess the

    credentials that demonstrate your knowledge and skills necessary to

    function as a practical expert in the rapidly growing information security

    industry. Job-based certifications are available for administrators for the

    product areas designated below. Our relationship with Pearson VUE,

    which operates 5,000 testing centers in 165 countries, provides

    convenient access to certification exams and ensures impartial testing. 

    The RSA Certified Administrator specialization is designed for

    professionals who administer and maintain enterprise security systems

    that use RSA SecurID®, RSA Archer®, or RSA® Security Analytics.

    Certification Recommended RSA Courses

    RSA Archer CertifiedAdministrator

      RSA Archer Administration

      RSA Archer Advanced Administration

    RSA SecurID CertifiedAdministrator

      RSA Authentication Manager Administration

      RSA Authentication Manager Installation and

    Configuration

    RSA Security AnalyticsCertified Administrator

      RSA Security Analytics Administration

    EMC2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in theUnited States and/or other countries. All other trademarks used herein are the property of their respective owners.© Copyright 2014 EMC Corporation. All rights reserved. Published in the USA.

    EDCAT SB 0615 r1

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    7/81

    SUMMARY OF OFFERINGS BY DELIVERY MODE

    7

    ILT VILT e-Learning Online ILT

    Identity and Access Management

    RSA Access Manager Administration, Installation and Configuration

    RSA Via Lifecycle and Governance Administration

    RSA Business Role Manager

    RSA Data Access Governance Basics

    RSA Authentication Manager Administration

    RSA Authentication Manager Installation and Configuration

    RSA SecurID Help Desk Basics

    RSA Authentication Manager 6.1 to 8.x Data Migration

    Migrating RSA Authentication Manager v6.1 to a v8.1 HardwareAppliance

    RSA Authentication Manager 7.1 to 8.x Data Migration

    Migrating RSA Authentication Manager v7.1 to a v8.1 Hardware

    Appliance

    Governance, Risk and Compliance

    Getting Started with Enterprise Risk Management

    Getting Started with Policy and Compliance Management

    GRC Overview

    RSA Archer Administration

    RSA Archer Advanced Administration

    RSA Archer Solutions Overview

    RSA Archer Security Operations (SecOps) Management Essentials

    [Expected availability: early Q4 2015] 

    RSA Archer Security Operations (SecOps) Management Solution

    Basics 

    RSA Archer Custom End-User Training Service

    Advanced Security Operations

    RSA Data Loss Prevention Administration

    RSA ECAT Fundamentals

    RSA Security Analytics Introduction

    RSA Security Analytics 10.5 What’s New Overview 

    RSA Security Analytics Foundations

    RSA Security Analytics Core Administration

    RSA Security Analytics Hunting

    [Expected availability: late Q4 2015] 

    RSA Security Analytics Introduction to Troubleshooting for

    Customers

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    8/81

    SUMMARY OF OFFERINGS BY DELIVERY MODE (CONTINUED) 

    8

    ILT VILT e-Learning Online ILT

    Anti Fraud

    RSA Adaptive Authentication On Premise Administration    

    RSA Adaptive Authentication for eCommerce Back Office Tools

    RSA Adaptive Authentication 12 Migration

    RSA Web Threat Detection Essentials

    Cyber Defense

    RSA Intelligence-Driven Event Analysis

    RSA Incident Handling and Response

    RSA Threat Intelligence

    RSA Malware Analysis

    RSA SOC Simulation Challenge

    RSA Cyber Defense Workshop

    Security Concepts and Principles

    RSA Security Awareness Program

    RSA Certified Information Systems Security Professional (CISSP)

    Boot Camp

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    9/81

     

    9

    RSA® Access Manager Administration,

    Installation and ConfigurationCourse Description 

    Overview RSA Access Manager system architecture, server structure, integration of components

    into an enterprise infrastructure, user organization, and the importance of various

    configuration parameters are discussed. Hands-on labs allow the student to work step-by-

    step through the phases of an RSA Access Manager implementation.

    Extensive hands-on labs and the use of a realistic case study reinforce the tasks involved

    in creating a complete Web access management solution.

    Audience System, security, or help desk personnel who need to install, deploy and/or maintain RSA

    Access Manager.

    Duration 4 days

    Prerequisite Knowledge/Skills 

    Familiarity with Web and directory server or database technologies; A functionalknowledge of OS and networking fundamentals.

    Course Objectives Upon successful completion of this course, participants should be able to:

      Explain the basic architecture and integration of RSA Access Manager in an enterprise

    environment

      Describe the processes and methodology for performing a successful installation and

    implementation of the core servers, data adapter, Administrative Console and

    representative Agents

      Describe the management functions used for resource and end user administration

      Using a case study, perform typical administration functions to populate and

    configure users, administrators and groups in an RSA Access Manager database

      Explain the configuration parameters that can be used to tailor the RSA Access

    Manager components to accomplish specific tasks and functions

      Establish Entitlements and use RSA Access Manager Smart Rules™ to manage Web

    access and protect resources in a classroom Web environment

      Perform system troubleshooting and analysis through the use of audit logs and user

    reports

      Explore how runtime and administrative operations can be extended through the use

    of the API library

    AT-A-GLANCE

    This course offers

    theoretical and hands-on

    instruction in the

    administrative functions,

    operations, andinstallation and

    configuration tasks

    associated with the RSA

    Access Manager product.

    REGISTER FOR CLASSES:

    For an up-to-date scheduleof Instructor-led classes and

    other training options, visit

    the RSA Training and

    Certification web site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts

    01730

    COURSE PART NUMBERS:

    ED CLRAIN210 – Onsite Class

    ED ACCMGR TRAIN UNIT – 

    Training Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    10/81

     

    10© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      RSA Access Manager Overview

    ▬  High level description of RSA Access Manager

    and its contribution to access management

      RSA Access Manager Architecture

    ▬  Description and functions of the Primary

    Servers; Web and Application Server Agents

    ▬  Data Flow for the Runtime and Administrative

    operations

    ▬  Description of how RSA Access Manager fits

    into a distributed security model

      Installation and Configuration

    ▬  Description of RSA Access Manager system

    requirements and pre-installation readiness

    tasks

    ▬  Installation procedure, options, and

    recommended practices

    ▬ Installation of Access Manager Servers, LDAPData Adapter, Administrative Console, and

    Web and Application Server Agents

    ▬  Configuration of Web Server for Single Sign-

    On

      Managing Resources

    ▬  Discussion of how resources (Web sites,

    Applications, etc.) are protected using RSA

    Access Manager – focusing on selectivity and

    granularity in various situations

    ▬  Registration of Web Servers and definition of

    Applications

    ▬  Discussion of Virtual Web Server Hosts

    ▬  Configuration of Web Server for virtual hosts

      Delegated Administration

    ▬  Discussion of the administrative structure that

    is possible in an RSA Access Manager

    installation

    ▬  Use of Administrative Groups and ownership

    hierarchy of administrators, users, and objects

    ▬  Examination of Administrative Roles and

    responsibilities

     

    Managing the Organization▬  Policy control for user authentication and

    passwords

    ▬  Methodology of structuring users, groups, user

    attributes, and properties

    Creation of user properties and addition of

    users to groups 

      Resource Protection and Authentication

    ▬  Discussion of Authentication Methods used to

    protect resources; Form-based vs.

    challenge/response authentication; Chaining

    and combining forms

    ▬  Discussion of how resources are defined to

    allow granular protection

    ▬  Use of RSA Access Manager Entitlements and

    Smart Rules to selectively manage access to

    resources

    ▬  How to manage conflicts among Smart Rules

    and between Smart Rules and Entitlements

    ▬  Configuration of Access Manager for external

    authentication and URL retention

      Troubleshooting

    ▬  Examination of the log files and use of special

    configuration parameters to control log detail

    ▬ Configuration of servers for centralized

    logging

    ▬  Configuration of Network Management

    ▬  Discussion of approaches to user and system

    troubleshooting

      Development Tools

    ▬  Discussion of the various Runtime,

    Administrative, and Web Agent Extension API

    tools that are available

    ▬  Examination and implementation of JAVA

    coding examples

      Single Sign-On

    ▬  Discussion of the function and objectives of

    creating a single sign-on environment

    ▬  Explanation of the differences and challenges

    of ‘Intra-’ vs. ‘Inter-’ site single sign-on

    ▬  Configuration of Access Manager for SSO and

    ISSO

      Distributed Authorization

    ▬  Discussion of achieving redundant

    functionality and failover

    ▬  Explanation of the differences in Standard

    Mode vs. Distributed Mode failover

    ▬  Test of centralized logging

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    11/81

     

    11

    RSA® Via Lifecycle and Governance

    Administration Course Description OverviewThis course provides an overview of the administrative responsibilities and configuration

    options associated with the RSA Via Lifecycle and Governance (RSA Via L & G) platform.

    Students will gain a comprehensive understanding of the access review cycle, change

    request and provisioning capabilities of the platform. Students will enable the ACM, ARM,

    AFX and Rules modules. Hands-on labs are used to reinforce the tasks involved in

    configuring, maintaining, and utilizing the platform to collect identities, accounts,

    entitlements and application roles for several directories and applications as well as

    perform user and account reviews and other tasks in a simulated review cycle. Students

    will configure the components necessary to automate provisioning and new user

    registration processes and will create workflows, notifications, and several types of

    change requests. Students will discuss collectors, applications, directories, business

    descriptions, roles, rules, provisioning options, reporting and dashboards to provide an

    end-to-end structured experience for the students.

    AudienceRSA Via Lifecycle and Governance (formerly RSA IMG) platform administrators,

    implementers and other technical users who need to configure, administer, or support the

    RSA Via Lifecycle and Governance platform.

    Duration

    4 days

    Prerequisite Knowledge/SkillsFamiliarity with Identity Management concepts, Active Directory, LDAP, and SQL

    querying.

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      List the components included in the RSA Via L&G platform

      Understand platform configuration options

      Enable the ACM, ARM, Roles, AFX and Rules modules

      Package and import platform resource objects

     

    Perform administrative functions, including configuring identity, account, and

    entitlement collectors, and unifying user data

      Configure and process business policy sets, rules, notifications and workflows

      Configure, run, and perform user access certification reviews

      Configure and take action on change requests, user registrations, and workflows for

    requests

      Deploy automated provisioning options for change requests and user registrations

      Create and publish reports and charts to dashboards and external sources

    AT-A-GLANCE

    The RSA Via Lifecycle and

    Governance Administration

    course provides an

    overview of the

    administrative andconfiguration options

    associated with the RSA Via

    Lifecycle and Governance

    platform.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED-VLG-ADM-110 – Public class

    ED-VLG-ADM-210 – Onsite

    class

    ED-VLG-ADM-TRAINUNIT – 

    Training Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    12/81

     

    12© Copyright 2015 EMC Corporation. All rights reserved. 09/2015EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Introduction to RSA Via L&G

    ▬  RSA Via L&G Platform Overview

    ▬  Course scenario overview

    ▬  Data model overview

    ▬  Prestige Simulation

     

    Administration Overview▬  AveksaAdmin account

    ▬  Admin menu

    ▬  Enabling platform modules

    ▬  Enabling Notifications

    ▬  Help system

    ▬  Task list

    ▬  UI Security

      RSA Via L&G Platform User Interface

    ▬  Admin System Settings

    ▬  User Interface styles

    ▬  Naming your environment

    ▬  Login Screen

    ▬  Header and Menu Bar

    ▬ Packaging and Importing

      Requirements Gathering

    ▬  Business Resources

    ▬  Directories and Applications

    ▬  Out of the Box Attributes

    ▬  Custom Attributes

    ▬  Custom Values Lists

    ▬  Collected VS. ACM Managed Attributes

    ▬  Hiding attributes

    ▬  Table options

      Users and Identities

    ▬  Users and Identities Overview

    ▬  Directories

    ▬ Directory Groups

    ▬  Business Units

    ▬  Identity Data Collectors

    ▬  Unification Process

    ▬  Collecting Identities

    ▬  Authentication

      Accounts, Roles and Entitlements

    ▬  Aveksa Admin roles

    ▬  Granular Aveksa Admin Privileges

    ▬  Rapid Application Onboarding

    ▬  Account Attributes

    ▬  Account Data Collectors

    ▬  Orphaned Accounts

    ▬ Entitlement Attributes

    ▬  Entitlement Data Collectors

    ▬  Application Roles

    ▬  Business Descriptions

    ▬  Collecting Entitlements 

    ▬  Collecting multiple owners for resources 

      Roles

    ▬  Roles Overview

    ▬  Collecting Application Roles

    ▬  Roles module vs. BRM

      Rules

    ▬  Rules Overview

    ▬  Rule Definitions

    ▬  Out of the box Rules

    ▬  Creating custom rules

    ▬  Rules logic

    ▬ Processing Rules

    ▬  Violations, Remediations and exceptions

    ▬  Out of the box and custom rules workflows

    ▬  Granular security for rules

      Reviews

    ▬  Reviews Overview

    ▬  Creating Review Definitions

    ▬  Modifying reviews workflows

    ▬  Administering Reviews

    ▬  Performing Reviews

    ▬  Refreshing Reviews

    ▬  Watch closures

    ▬  Completing a Review and Reporting Results

     

    Workflows, Notifications and Escalations▬  Workflows Overview

    ▬  Creating Workflows

    ▬  Out of the box templates

    ▬  Creating Notification templates

    ▬  Creating Escalations

    ▬  Viewing email logs

      Dashboards and Reports

    ▬  Reports Overview

    ▬  Out of the box reports and charts

    ▬  Modify OOTB reports using the query tab

    ▬  Build Custom Reports and Charts

    ▬  Dashboard options

    ▬ 

    Build and modify dashboards  Access Request Manager

    ▬  Access Requests Manager Overview

    ▬  Custom Forms and controls (fields)

    ▬  Custom Buttons

    ▬  Naming policies and naming transforms

    ▬  Custom User and Entitlement Views

    ▬  Workflows, Notifications and Escalations

    ▬  Provisioning options

      Provisioning with AFX

    ▬  Access Fulfillment Express Overview

    ▬  Deploying Access Fulfillment Express

    ▬  Importing AFX Connectors

    ▬ Configuring Connectors

    ▬  Configuring Endpoint capabilities

      Capstone Structured Experience

    ▬  Complete end-to-end access review cycle

    ▬  Deploy change requests with automated

    provisioning

    ▬  Publish final reports to simulation auditorsand executives 

      Additional Resources

    ▬  Community membership

    ▬  RSA Secure Care Online

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    13/81

     

    13© Copyright 2014 EMC Corporation. All rights reserved. 03/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    RSA® Business Role ManagerCourse Description 

    OverviewThe RSA Business Role Manager eLearning module extends the capabilities of the IMG

    product to include the ability to group users and entitlements into roles. The RSA BRM

    eLearning module provides an overview of BRM components. Topics include terminology,

    configuration, and role mining options to tailor the module to a customer’s needs .

    Demonstrations illustrate the tasks involved in configuring, maintaining, and utilizing the

    Business Role Manager module.

    The course is comprised of lecture content as well as recorded product demonstrations to

    illustrate the RSA BRM product in action.

    AudienceRSA Identity and Access Management/Identity Management and Governance/RSA Via

    Lifecycle and Governance administrators, implementers and other technical users who

    need to configure, administer, or support the RSA Business Role Manager module.

    Duration4 hours (eLearning)

    Prerequisite Knowledge/SkillsCompletion of the RSA Identity Management and Governance (IMG) course (or former

    RSA ACM Foundations course).

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Enable the Roles option and Business Role Manager module

      Understand the functionality and capabilities of the Roles and Business Role Managermodules

      Understand Business Role Manager terminology  Understand the differences between business, technical, and global roles  Interpret role metrics are produced  Create, configure and manage roles  Create and configure role options  Create and configure role sets  Discover roles and entitlements

      Define role membership rules

     

    Manage organization roles for compliance to best practice principles  Allow others to manage roles

    AT-A-GLANCE

    The RSA Business Role

    Manager eLearning provides

    instruction on the

    administrative

    responsibilities and

    configuration options

    associated with the RSA

    Business Role Managermodule.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED-VLG-ADM-TRAINUNIT – 

    Training Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    14/81

     

    14© Copyright 2014 EMC Corporation. All rights reserved. 12/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Business Role Manager Overview

    ▬  BRM Features

    ▬  Definition of a Role

    ▬  Benefits of using Roles in Access Governance

    ▬  Difference between Business Roles and

    Technical Roles

      Enable and Configure BRM

    ▬  How to enable BRM.

    ▬  Role configuration options

    ▬  Role management options

      Create a Role

    ▬  Best practices for creating a role

    ▬  Definition of a birthright role

    ▬  How to create a role

    ▬  Definition of a role set

    ▬ How to create a role set

    ▬  How to add members to a role

    ▬  Role membership rules

    ▬  Role metrics

      Discover Roles

    ▬  Benefit of role discovery

    ▬  Definition of top-down role modeling

    ▬  Demonstration of top-down role modeling

    ▬  Definition of bottom up role modeling

    ▬  Demonstration of bottom-up role modeling

      Manage Roles

    ▬  Role management lifecycle

    ▬  Common indicators of role problems

    ▬  Using roles in entitlement reviews

    ▬ Interpreting role metrics

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    15/81

     

    15

    RSA® Data Access Governance BasicsCourse Description 

    OverviewThis eLearning course discusses the use of the RSA Data Access Governance module as a

    tool to collect and manage user access to data resources. Topics include collection

    configuration, access reviews, user access requests, and data resource ownership.

    Recorded demonstrations (eLearning) reinforce the tasks involved in configuring,

    maintaining, and utilizing the Data Access Governance module.

    AudienceRSA Identity and Access Management/Identity Management and Governance

    administrators, implementers and other technical users who need to configure,administer, or support the RSA IMG Business Role Manager module.

    Duration2 hours (eLearning)

    Prerequisite Knowledge/SkillsCompletion of the RSA Identity Management and Governance (IMG) Administration

    course (or former RSA ACM Foundations course).

    Course ObjectivesUpon successful completion of this course, participants should be able to:  Enable the RSA Data Access Governance (DAG) module

      Understand how RSA DAG and StealthBits® StealthAUDIT® work together to collect

    data resource information

      Manage reviews of resource owners and user access

      Configure rules to support an organization’s user access policies 

      Configure and manage end user data access requests

    Course Outline

      Purpose and function of RSA Data Access Governance

    ▬  Use and benefits of RSA DAG

    ▬  Permission types

    ▬ DAG operations

      RSA DAG Architecture

    ▬  Components and functions

    ▬  Data flows

      Process and Workflows

    ▬  Data acquisition

    ▬  Review workflow

    ▬  Rules and rule processing

    ▬  End user data access requests

    AT-A-GLANCE

    The RSA Data Access

    Governance Basics

    eLearning course provides

    instruction on the

    administrative

    responsibilities and

    configuration options

    associated with the RSAData Access Governance

    module.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED-VLG-ADM-TRAINUNIT – 

    Training Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    16/81

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    17/81

     

    17© Copyright 2014 EMC Corporation. All rights reserved. 12/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Product and Technology Overview

    ▬  High level description of RSA Authentication

    Manager and its contribution to user

    authentication

    ▬  Authentication as a foundation of security,

    trust and confidence in digital identities

    ▬  RSA Authentication Manager system

    components and communication

      RSA SecurID Authentication

    ▬  RSA SecurID authentication options

    ▬  Concepts of strong user authentication

    ▬  Token technology – time synchronization,

    authenticator types

      Risk-Based Authentication

    ▬  Configuration and management of Risk-

    based authentication

    ▬  Device fingerprinting and behavior data

    collection and analysis

    ▬  Selecting assurance levels

      Deployment and Administrative Structure

    ▬  Deployment planning and establishing an

    administrative structure

      Policy Management

    ▬  Defining and applying policies to the system

    and Security Domains

    -  Password and Token policies

    -  Lockout and self-service policies

    -  Risk-based and Offline authentication

    policies

      System Administration

    ▬  Establishing and maintaining organizational

    and administrative structures:

    -  LDAP Identity Sources

    -  Security Domains

    -  User and User Group structures

    -  Administrative roles and delegation

    -  Authentication Agents

      Authenticator Management

    ▬  Managing RSA SecurID hardware tokens

    ▬  Software token deployment and installation

    ▬  Managing Risk-Based Authentication

    ▬  Managing On-Demand Authentication

      Auditing, Reports and Troubleshooting

    ▬  RSA Authentication Manager report functions

    ▬  Report customization

    ▬ 

    Troubleshooting procedures

      Self-Service Management and Support

    ▬  Configurations for user self-service functions

    ▬  User account and authenticator management

    and provisioning 

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    18/81

     

    18

    RSA® Authentication Manager

    Installation and ConfigurationCourse Description 

    OverviewThis course assumes that the student has attended the RSA Authentication

    Manager Administration course or has equivalent operation and administrative

    experience with RSA Authentication Manager – administrative tasks are not

    covered as part of this course.

    AudienceTechnical personnel who install, service and support RSA Authentication Manager

    and RSA SecurID deployments.

    Duration2 days

    Prerequisite Knowledge/SkillsMicrosoft® Windows® or UNIX/Linux system administration; attendance in RSA

    Authentication Manager Administration course, or equivalent v7.1 or v8

    administration experience; Familiarity with virtual machine deployment onVMware.

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Plan and perform the pre-installation, installation, and configuration tasks to

    accomplish an RSA Authentication Manager virtual appliance installation in a

    VMware environment

      Configure RSA Authentication Manager system parameters

      Configure and connect to external LDAP Identity Sources

      Create redundant/failover RSA Authentication Manager replica servers and

    understand the role and management of replica server instances

     

    Install and configure RSA Authentication Agents for local workstation and webaccess protection

      Perform an RSA Authentication Manager Web Tier installation to support user

    self-service and risk-based authentication

    AT-A-GLANCE

    This course offers hands-on

    training on the installation

    and configuration of RSA

    Authentication Manager,

    Authentication Agents, WebTier, and other RSA

    SecurID® system

    components.. 

    REGISTER FOR CLASSES:

    For an up-to-date schedule ofInstructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED AMINS210 – Onsite Class

    ED AM TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    19/81

     

    19© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      RSA Authentication Manager

    System Architecture

    ▬  Primary and Replica instances

    ▬  Authentication Agents and communication

    paths

    ▬  Identity Sources

    ▬  Firewall configurations

    ▬  Web Tier component

    ▬  RADIUS communication

      Deployment Scenarios and Planning

    ▬  Deployment and Installation planning

    ▬  Using the right Authentication Agent

    ▬  Planning administrative support

    ▬  Using CT-KIP for software token deployment

      RSA Authentication Manager Deployment

    ▬  Pre-Installation requirements and

    considerations▬  Supported VMware environments and

    features

    ▬  V8.1 Hardware Appliance deployment

    ▬  Deployment process and steps

    ▬  Post-deployment tasks

      System Configurations

    ▬  Settings and configurations

    -  System-wide configurations

    -  Instance settings

    -  Console and dashboard personalization

     

    Authentication Agent Configurations▬  Functions and features of representative

    Authentication Agent installations for

    Microsoft Windows and Linux operating

    systems

    ▬  Configuring Agent software for local,

    network and web access protection

    ▬  Handling node secret and sdconf.rec files

      Replica Instances

    ▬  Strategies for dealing with primary instance

    failures and replica promotion

    ▬  Creating replica packages

    ▬  Establishing preferred and failover servers in

    Agent hosts

      Web Tier Installation

    ▬  Requirements and installation process for the

    Web Tier component

    ▬  Customizing the end user interface

      System Utilities

    ▬  Using the Command-line Utility package

    ▬  Installing and configuring the Windows MMC

    snap-in

    ▬  Managing Realm trusts

      Credential Manager Configuration

    ▬ Setting up the Credential Manager for

    provisioning

      RADIUS Server Configuration

    ▬  RADIUS functions and capabilities

    ▬  Primary and Replica RADIUS servers

    ▬  Managing RADIUS users

      RSA Authentication Manager Migration Overview

    ▬  Optional overview of the migration process

    from version 6.1 to version 8 and/or version

    7.1 to version 8

    ▬  This module is delivered if students are

    planning to perform a migration in their

    production system and are interested in the

    general planning and steps involved in a

    migration

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    20/81

     

    20

    RSA SecurID® Help Desk BasicsCourse Description 

    OverviewAn overview of RSA Authentication Manager and RSA SecurID authenticators and

    authentication methods are presented, as well as how functions and controls are

    accessed in the administrative interface. Instructor demonstrations of important

    operations relating to typical end user cases reinforce the steps that Help Desk

    representatives can take for troubleshooting and assisting their user population.

    This course is useful for new representatives supporting RSA SecurID users as well

    as a refresher course for representatives who infrequently work with RSA SecurID

    support issues.

    AudienceHelp Desk representatives who need to assist and support RSA SecurID users

    Duration1 day

    Prerequisite Knowledge/SkillsGeneral familiarity with system administration functions

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Understand the high-level architecture and theory of operation of the RSA

    SecurID product suite

      Identify common authentication problem areas

      Perform common user assistance tasks

      Understand the use of the user Self-service capabilities

    AT-A-GLANCE

    This course provides the

    fundamental information

    about an RSA SecurID®

    system deployment to assist

    Help Desk representatives

    respond to end users.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l: 781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED AM TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    21/81

     

    21© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

    The following modules are designed to support thecourse objectives:

      RSA SecurID System Overview

    ▬  High level description of RSA SecurID and

    RSA Authentication Manager system

    components

    ▬ RSA authentication methods:

    o  Hardware and Software authenticators

    o  On-Demand Authentication

    o  Risk-Based Authentication

    ▬  Authentication process and data flow

      Authentication Problem Areas

    ▬  Identifying and isolating user problems

    ▬  Common user errors

    ▬  Differentiating User vs Agent vs Server

    problems

      System Configurations

    ▬  Organizational structures – users, groups,

    Security Domains and Identity Sources

    ▬  Authentication options and policies

      Authenticator Operations

    ▬  Hardware tokens

    ▬  Software tokens

    ▬  On-demand codes

    ▬  Emergency and temporary codes

      Monitors and Reports

    ▬  Using the Authentication Monitor

    ▬  Generating reports to track and user activity

      User Troubleshooting

    ▬  Troubleshooting procedures

    ▬  Security considerations

      Self-service Console

    ▬  User self-service functions

    ▬  Self-Service provisioning flow

    ▬  Troubleshooting user self-service problems 

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    22/81

     

    22

    RSA® Authentication Manager 6.1 to

    8.x MigrationCourse Descriptions 

    OverviewProduct functionality that is pertinent to the migration of v6.1 is discussed as well

    as the process and considerations for migrating to a v8.x environment.

    Note that this course discusses migration of “out-of-box” deployments and does

    not address migration of customized APIs running under v6.1.

    AudienceTechnologists who are responsible for an RSA SecurID system and intend on

    migrating from RSA Authentication Manager v6.1 to v8.

    Prerequisite Knowledge/SkillsFamiliarity with RSA SecurID technology and RSA Authentication Manager v6.1.

    RSA Authentication Manager 6.1 to 8.0 Data MigrationThis course describes the features and functions that are new to RSA

    Authentication Manager v8.x as well as how database objects and structures map

    from v6.1 to v8.x. It details several deployment and migration scenarios and thesteps required to migrate v6.1 data to a v8.x installation.

    Duration

    Approximately 1 hour

    Migrating RSA Authentication Manager v6.1 to a v8.1Hardware ApplianceThis course augments the data migration course (described above) and focuses on

    the process and considerations for migrating to a version 8.1 hardware appliance

    from v6.1.

    DurationApproximately 15 minutes

    This elearning course is available to customers at no charge.

    If you are accessing RSA eLearning for the first time, please visithttp://powerlink.emc.com to establish an account.

    If you already have an account through EMC Powerlink, go directly towww.emc.com/rsa-training to access this course.

    AT-A-GLANCE

    This eLearning course

    guides the participant

    through the steps to

    accomplish a standard

    migration from RSAAuthentication Manager

    version 6.1 to version 8.x.

    REGISTER FOR CLASSES:

    For an up-to-date schedule ofInstructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    23/81

     

    23© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    RSA Authentication Manager 6.1 to 8.0Data Migration

    Course ObjectivesUpon successful completion of this course,

    participants should be able to:

      Provide an overview of the fundamental

    differences between RSA Authentication Manager

    v6.1 and v8.x – features and functions

      Describe the specific database objects that are

    migrated between product versions and how they

    are handled by the migration

      Describe the pre-migration steps to prepare a

    v6.1 database for migration

      Describe the post-migration structures that can

    be created in v8.x to contain and manage

    migrated objects

    Course Outline  Comparison of v6.1/v8.x Architecture and

    Administrative Structures

    ▬  Describes the general architecture and

    compares differences/parallels between

    product versions

    ▬  Describes the major areas of importance in

    the v8.x data structures and how they map

    to a v6.1 environment

    ▬  Describes terminology used in v8.x

      Overview of the Migration Process

    ▬ 

    High-level description of the methodologyfor approaching a migration

    ▬  Describes in detail how database objects are

    mapped from version to version

      Pre-Migration Preparation

    ▬  Describes the considerations and best

    practices involved in preparing a v6.1

    environment for migration — database

    cleaning, creating/dismantling structures,

    etc. and preparing a v8.x environment to

    receive migrated information — what

    decisions and elements should be made

    before migration

      Post-Migration Considerations

    ▬  Description of tasks that can be performed

    after the completion of the migration

    process

      Migration of an RSA SecurID Appliance

    ▬  Describes the general process for migrating

    data from a v6.1 RSA SecurID Appliance to

    a v8 environment

    Migrating RSA Authentication Managerv6.1 to a v8.1 Hardware Appliance

    Course ObjectivesUpon successful completion of this course, participants

    should be able to:

      Understand a deployment architecture that

    includes one or more v8.1 hardware appliances as

    primary and/or Replica instances

      Describe the migration process of migrating from

    a v6.1 software or hardware appliance platform to

    a v8.1 hardware appliance

    Course Outline  Overview of v8.1 Architecture

    ▬  Describes the architecture and deployments

    options that include a v8.1 hardware

    appliance

      Overview of the Migration Process

    ▬  Describes migration tasks involved with

    migrating to a hardware appliance that are

    over and above the tasks involved with data

    migration alone

    ▬  Using the v6.1 Migration Assessment Tool

      Migration Steps

    ▬  Describes the initial connections and setup of

    a v8.1 hardware appliance

    ▬  Describes the steps involved with migration

    from exporting v6.1 data to importing it into a

    v8.1 hardware appliance.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    24/81

     

    24

    RSA® Authentication Manager 7.1 to

    8.x MigrationCourse Descriptions 

    OverviewProduct functionality that is pertinent to the migration is discussed as well as

    virtual and hardware appliance deployment, Web Tier, and Risk-Based

    Authentication options that are new in v8.x.

    Note that these courses discuss migration of “out-of-box” deployments and do not

    address migration of customized environments or APIs running under v7.1.

    AudienceTechnologists who are responsible for an RSA SecurID system and intend on

    migrating from RSA Authentication Manager v7.1 to v8.

    Prerequisite Knowledge/SkillsFamiliarity with RSA SecurID technology and RSA Authentication Manager v7.1.

    RSA Authentication Manager 7.1 to 8.0 Data MigrationThis course describes the features and functions that are new to RSA

    Authentication Manager v8.x. It details several deployment and migrationscenarios and the steps required to migrate v7.1 data to a v8.x installation.

    Duration

    Approximately 1 hour

    Migrating RSA Authentication Manager v7.1 to a v8.1Hardware ApplianceThis course augments the data migration course (described above) and focuses on

    the process and considerations for migrating to a version 8.1 hardware appliance

    from v7.1. The information in this course is appropriate for v7.1 deployments that

    currently use hardware appliances as well as for migrations to v8.1 that will beginusing a hardware appliance for the first time.

    Duration

      Approximately 15 minutes

    AT-A-GLANCE

    This eLearning course

    guides the participant

    through the steps to

    accomplish a standard

    migration from RSAAuthentication Manager

    version 7.1 to version 8.x.

    REGISTER FOR CLASSES:

    For an up-to-date schedule ofInstructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    This elearning course is available to customers at no charge.

    If you are accessing RSA eLearning for the first time, please visithttp://powerlink.emc.com to establish an account.

    If you already have an account through EMC Powerlink, go directly towww.emc.com/rsa-training to access this course.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    25/81

     

    25© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    RSA Authentication Manager 7.1 to 8.0Data Migration

    Course ObjectivesUpon successful completion of this course,

    participants should be able to:

      Provide an overview of the fundamental

    differences between RSA Authentication Manager

    v7.1 and v8 – features and functions

      Describe the migration process

      Describe the pre-migration steps to prepare for

    v7.1 data export

      Describe the post-migration tasks in a v8

    environment

    Course Outline  Comparison of v7.1/v8 Architecture

    ▬  Describes the general architecture and

    system components that are similar to v7.1

    and those that are new to v8

      Overview of the Migration Process

    ▬  High-level description of the options and

    methodology involved with migration

    ▬  Discusses approaches to minimize downtime

    during migration

      Migration Steps

    ▬  Discusses pre-migration preparations

    ▬  Describes the v8 deployment

    ▬ 

    Describes installation of the RSAAuthentication Manager Migration Export

    Utility

    ▬  Describes Basic and Advanced migration

    options

    ▬  Considerations for RADIUS migration

      Post-Migration Tasks

    ▬  Describes tasks to be performed after the

    completion of the migration process

    ▬  Discusses rolling back a migration

      Migration Assistance

    ▬ Describes troubleshooting information andhow to obtain further assistance from RSA

    resources

    Migrating RSA Authentication Managerv7.1 to a v8.1 Hardware Appliance

    Course ObjectivesUpon successful completion of this course, participants

    should be able to:

      Understand a deployment architecture that

    includes one or more hardware appliances as

    primary and/or Replica instances

      Describe the migration process of migrating from

    a software or hardware appliance platform to a

    v8.1 hardware appliance

      Understand how to upgrade an existing supported

    hardware appliance to be v8.x-capable

    Course Outline  Overview of v8.1 Architecture

    ▬  Describes the architecture and deployments

    options that include a v8.1 hardware

    appliance

      Overview of the Migration Process

    ▬  Describes migration tasks involved with

    migrating to a hardware appliance that are

    over and above the tasks involved with data

    migration alone

      Upgrading and Re-imaging an RSA SecurID

    Appliance

    ▬  Describes the process to upgrade supported

    RSA SecurID Appliance 3.0 equipment to

    enable it to host a v8.x instance

      Migration Steps

    ▬  Describes the steps involved with migration

    from exporting v7.1 data to importing it into a

    v8.1 hardware appliance.

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    26/81

     

    26

    Getting Started with Enterprise Risk

    ManagementCourse Description 

    OverviewStudents will gain knowledge of the key RSA Archer ERM components through

    presentations and hands-on exercises.

    AudienceRisk management team members who will be using the RSA Archer Risk

    Management solution to define, support, and maintain a risk management

    initiative. This may include managers, team leads, and anyone involved in scoping

    a risk project.

    Duration2 days

    Prerequisite Knowledge/SkillsFamiliarity with RSA Archer eGRC framework and a general familiarity with

    organizational Risk concepts.

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Explain basic Risk Management terminology and methodologies

      Illustrate the structure of the RSA Archer Risk Management Solution

      Define business requirements related to Risk Management

      Begin the implementation process of an Enterprise Risk Management program

    AT-A-GLANCE

    This course provides an

    overview of the concepts,

    processes, and procedures

    necessary to successfully

    begin implementation of anEnterprise Risk Management

    (ERM) system.

    REGISTER FOR CLASSES:

    For an up-to-date schedule ofInstructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED ARCERM210 – Onsite Class

    ED ARC TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    27/81

     

    27© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Introduction to Risk Management

    ▬  What is Risk?

    ▬  General Enterprise Risk Management

    Approach Overview

    ▬  Types of Risk

      Digging Deeper

    ▬  Common Frameworks Overview

    ▬  Developing a Common Risk Taxonomy

    ▬  Elements of Risk Management

    ▬  Phases of Growth:

    ▬  Risk Identification

    ▬  Assessment

    ▬  Decision

    ▬  Treatment

    ▬  Monitoring

     

    RSA Archer Risk Management Solution

    ▬  RSA Archer ERM Structure Components

    ▬  ERM Processes and Key Integrations with

    Other Solutions

    ▬  How RSA Archer Maps to Common Risk

    Frameworks

      Top-Down Risk Assessment

    ▬  Discussion: Common Issues for Specific

    Industries/Business Types

    ▬  Exercise: Risk Identification

    ▬  Exercise: Risk Assessment

    ▬ 

    Exercise: Risk Decision▬  Exercise: Risk Treatment

    ▬  Exercise: Metrics Monitoring

    ▬  Exercise: Loss Monitoring

    ▬  Exercise: Overall Monitoring

      Bottom-Up Risk Assessment

    ▬  Exercise: Create a new Risk Project

    ▬  Exercise: Complete Risk Assessments

    ▬  Exercise: Create reports based on new data

    ▬  Exercise: Bring in sample model data via Data

    Import

    ▬ Exercise: Create dashboard that incorporates

    model data’s impact on business 

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    28/81

     

    28

    Getting Started with Policy and

    Compliance ManagementCourse Description 

    OverviewStudents will gain knowledge of the key RSA Archer Policy and Compliance

    Management components through presentations and hands-on exercises.

    AudiencePolicy and Compliance management team members who will be using the RSA

    Archer Policy and Compliance Management solution to define, implement, and

    maintain a policy and compliance management initiative. This may include

    managers, team leads, and anyone involved in consolidating policies and ensuring

    compliance with authoritative sources.

    Duration2 days

    Prerequisite Knowledge/SkillsFamiliarity with the RSA Archer eGRC framework and a general familiarity with

    policy and compliance concepts.

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Explain basic Policy and Compliance Management issues and processes

      Illustrate the structure of the RSA Archer Policy and Compliance Management

    Solution

      Begin the implementation process of a Policy and Compliance Management

    program

    AT-A-GLANCE

    This course provides an

    overview of the concepts,

    processes, and procedures

    necessary to successfully

    begin implementation of aPolicy and Compliance

    Management system.

    REGISTER FOR CLASSES:

    For an up-to-date schedule ofInstructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED ARCPCM210 – Onsite class

    ED ARC TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    29/81

     

    29© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Introduction to Policy and Compliance

    Management

    ▬  Top Policy and Compliance Management

    Issues

    ▬  Policy and Compliance Processes in a

    Nutshell

    ▬  Policy and Compliance Key Components

      RSA Archer Policy Management Solution

    ▬  RSA Archer Interface

    ▬  RSA Archer Policy Structure Components

    ▬  Phased Implementation Approach

    ▬  Post-Implementation Processes

      Policy Management Exercises

    ▬  Exercise: Analyze Existing Policy

    ▬ Exercise: Define Scope

    ▬  Extraction & Mapping

    ▬  Exercise: Policy Extraction

    ▬  Exercise: Control Standard Extraction &

    Mapping

    ▬  Exercise: Format/Import Content

    ▬  Exercise: Perform a Gap Analysis

    ▬  Exercise: Import Provided Content

    ▬  Exercise: Approve a Policy Change

    ▬  Exercise: Policy Awareness Campaign

      RSA Archer Compliance Management Solution

    ▬  Sarbanes-Oxley Act Concerns

    ▬  RSA Archer Compliance Structure

    Components

    ▬  How Compliance is Rated

    ▬ 

    Exception Requests Workflow

      Compliance Management Exercises

    ▬  Exercise: Review Control Procedure Mapping

    ▬  Exercise: Assess a Process Control

    ▬  Exercise: Assess a Technical Control

    ▬  Exercise: Address Findings – Remediation

    Plan

    ▬  Exercise: Address Findings – Exception

    Request

      Compliance Strategies

    ▬  Control-Based Compliance

    ▬  Asset-Based Compliance

    ▬  Compliance Testing Cycle

    ▬  Round Table Discussion

    ▬  Additional Resources

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    30/81

     

    30© Copyright 2015 EMC Corporation. All rights reserved. 9/2015EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    GRC OverviewCourse Description 

    Overview

    This self-paced eLearning course introduces the general concepts of Governance,

    Risk and Compliance (GRC) from a business perspective. It focusses on why GRC is

    important to business and how GRC impacts each area of a business.

    Audience- RSA Customers

    DurationApproximately 30 minutes (e-Learning)

    Prerequisite Knowledge/SkillsNone

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Describe the elements that comprise Governance, Risk and Compliance  Describe how GRC addresses business challenges  Understand the impact of GRC on people and processes within the business

    Course Outline  Business pressures and risks

      What is GRC?

      Governance, Risk and Compliance strategies

      How companies address GRC

      Enterprise GRC

      Stages of GRC adoption

      GRC for IT organizations

      Technology that supports GRC 

    AT-A-GLANCE

    This e-Learning course

    provides a general

    introduction to Governance,

    Risk, and Compliance

    concepts.

    This eLearning course is not

    product specific.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED-ARC-TRAINUNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    31/81

     

    31

    RSA Archer® AdministrationCourse Description 

    OverviewStudents will gain knowledge of the key RSA Archer platform components such as

    applications, security management, and communication tools through

    presentations and hands-on exercises. After taking this course, students will be

    able to plan, configure, and manage the RSA Archer environment.

    The subject matter in this course prepares students with the classroom component

    recommended for the RSA Archer Certified Administrator certification.

    AudienceArcher administrators who are responsible for building and managing the

    RSA Archer eGRC product.

    Duration4 days

    Prerequisite Knowledge/SkillsNone

    Course ObjectivesUpon successful completion of this course, participants should be able to:  Navigate within the RSA Archer system

      Configure the look and feel of the RSA Archer interface

      Create or edit an application

      Import data

      Set up email notifications

      Create data-driven events and calculated fields

      Manage user access

      Automate work streams

      Complete a questionnaire

      Perform a data feed

      Search and report on data

     

    Set up a dashboard

      Migrate changes between environments 

      Identify additional support resources

    AT-A-GLANCE

    This course provides an

    overview to the concepts,

    processes, and procedures

    necessary to successfully

    design and administer the

    RSA Archer platform.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED ARCADMIN210 – Onsite Class

    ED ARC TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    32/81

     

    32© Copyright 2014 EMC Corporation. All rights reserved. 09/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Introduction to RSA Archer

    ▬  RSA Archer Overview

    ▬  Introduction to the case study

      General Navigation

    ▬  Interface components

    ▬  Managing content records

      Configure the Appearance

    ▬  Managing Themes

    ▬  Managing the Appearance

      Centralize and Organize Data

    ▬  Data structure

    ▬  Application Builder overview

    ▬  Inside Manage Applications

    ▬  General Application Properties

    ▬ Field Management

    ▬  Page Layout

    ▬  Navigation Menu

      Import Data

    ▬  Using the Data Import Manager

      Alert Users to Data Changes

    ▬  Creating Letterheads

    ▬  Managing Subscription Notifications

    ▬  Troubleshooting Tips

      Optimize the User Experience

    ▬  Data-Driven Events

    ▬  Calculated Fields

    ▬  Troubleshooting Tips

      Manage User Access

    ▬  Access Control Basics

    ▬  User Accounts

    ▬  Access Roles

    ▬  Groups

    ▬  Record Permissions

    ▬  Private Fields

    ▬  Troubleshooting Tips

      Automate Work Streams

    ▬  Configure a two-stage workflow

      Questionnaires

    ▬  Question Library Overview

    ▬  Questionnaire Creation Process

    ▬  Completing a Questionnaire

      Integration Options

    ▬  Data Feed Manager

      Search and Report on Data

    ▬  Quick Search

    ▬  Advanced Search

    ▬  Statistics Search and Chart Options

    ▬  Reporting

     

    Communicate Information to Stakeholders

    ▬  iViews

    ▬  Dashboards

    ▬  Workspaces

    ▬  Additional Configuration Options

      Packaging for Production

    ▬  Creating Packages

    ▬  Installing Packages

    ▬  Advanced Package Mapper

      Design Best Practices

    ▬ Field Design Tips

    ▬  Application Layout Tips

    ▬  Data-Driven Event Tips

      Application Creation Case Study

    ▬  Hands-on exercise in which participants are

    challenged to build a best-in-class application

    with minimal assistance

      Course Summary

    ▬  Customer Support Options

    ▬  Certification Exam Information

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    33/81

     

    33

    RSA Archer® Advanced AdministrationCourse Description 

    OverviewThroughout the course, students will be presented with a diverse collection of real-

    world governance, risk, and compliance problems and be shown and guided

    through the recommended steps involved in solving these pain points by using the

    features available in the RSA Archer eGRC Suite.

    Extensive hands-on labs reinforce the tasks involved in designing and automating

    GRC processes and extending the value of the RSA Archer eGRC Suite throughout

    the organization. After completing this class, students will be prepared to use the

    RSA Archer eGRC Suite to solve an extensive array of GRC problems and meet thebusiness requirements of various enterprise stakeholders.

    AudienceGovernance, risk, and/or compliance professionals, business owners, or IT

    personnel who need to automate and streamline existing processes, integrate the

    RSA Archer platform with third-party systems, or deliver assessments across the

    enterprise.

    Duration4 days

    Prerequisite Knowledge/SkillsPrevious experience creating applications within the RSA Archer product or

    successful participation in the standard RSA Archer Administration course.

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Create a custom, multi-stage workflow process that automates a manual

    process

      Import existing information from a legacy system into RSA Archer applications

    and questionnaires

      Integrate the RSA Archer product with third-party systems and data sources to

    consolidate enterprise information

     

    Design best-practice assessment campaigns to measure compliance across the

    organization

      Construct complex search criteria to locate key information and identify data

    trends

      Visually showcase compliance with industry regulations through reports and

    dashboards

      Alert organization stakeholders through scheduled report distributions

      Export RSA Archer data into pre-formatted, professional-looking report

    templates 

    AT-A-GLANCE

    This course provides hands-

    on training on the

    administration,

    configuration and best-

    practice deployment of the

    RSA Archer Platform.

    REGISTER FOR CLASSES:

    For an up-to-date schedule of

    Instructor-led classes and other

    training options, visit the RSA

    Training and Certification web

    site:

    www.emc.com/rsa-training

    CONTACT US:

    Email:

    [email protected]

    Phone: 800-995-5095

    Int’l:  781-515-7700

    Fax: 781- 515-6630

    174 Middlesex Turnpike

    Bedford, Massachusetts 01730

    COURSE PART NUMBERS:

    ED ARCADVADM210 – Onsite

    Class

    ED ARC TRAIN UNIT – Training

    Units

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    34/81

     

    34© Copyright 2014 EMC Corporation. All rights reserved. 09/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.

    Course Outline

      Streamlining GRC Processes — Day One

    ▬  Replicating a multi-stage workflow to

    transfer a manual, paper-based process to

    an automated, online tool

    ▬  Constructing a scalable access control

    framework for enabling end users to

    participate in GRC processes

    ▬  Automating and manipulating data through

    calculations to support enhanced data

    analytics and reduce data entry time

      Integrating External Data — Day Two

    ▬  Transferring leveled, document-centric

    policies into a data-centric format in the RSA

    Archer Platform

    ▬  Using a data feed targeting database

    sources to quickly transfer legacy data to a

    centralized system

    ▬  Creating a data feed to access an RSS

    source and retrieve the information into an

    RSA Archer application

    ▬  Transferring data between RSA Archer

    applications to support data trending and

    reduce manual effort

      Demonstrating Compliance – Day Three

    ▬  Importing compliance questions into RSA

    Archer’s global question library 

    ▬  Creating an assessment campaign to

    demonstrate compliance with internal and

    external regulations

    ▬  Managing question scoring and findings

    generation to better understand the risk

    impact to the organization

    ▬  Referencing existing assessment responses

    in future assessments

      Communicating GRC Data – Day Four, Part I

    ▬  Generating real-time reports across distant

    data relationships to provide greater insights

    into GRC processes

    ▬  Designing a user-friendly dashboard and

    interface to clearly communicate the posture

    of various business units

    ▬  Delivering snapshot reports on a set schedule

    to inform key stakeholders of the current

    status

    ▬  Exporting RSA Archer data to email and Word

    templates to generate professional-looking,

    document-based reports for senior

    management

    ▬  Publishing RSA Archer data to external

    databases

     

    Maintaining the System – Day Four, Part II

    ▬  Discussing resources for the most current

    installation and sizing recommendations

    ▬  Configuring instance settings via the Archer

    Control Panel

    ▬  Accessing and reading log files

    ▬  Troubleshooting common RSA Archer issues

    to ensure effective system operations

  • 8/19/2019 h12172 Ds Rsa Education Services Catalog

    35/81

     

    35

    RSA Archer® Solutions Overview Course Description 

    OverviewThis self-paced, interactive e-Learning course provides an introduction to the RSA

    Archer Platform and its application to the management of Governance, Risk, and

    Compliance in an organization. RSA Archer’s Solution modules are described and

    use cases discussed for Out-of-the-Box applications.

    AudienceRSA Customers

    RSA PartnersRSA Internal Staff

    DurationApproximately 20 minutes (e-Learning)

    Prerequisite Knowledge/SkillsStudents should be familiar with basic principles of GRC (Governance, Risk, andCompliance).

    Course ObjectivesUpon successful completion of this course, participants should be able to:

      Understand Governance, Risk, and Compliance (GRC) and its organizational

    impact.  Describe the RSA Approach and its Business Value.  Summarize RSA Archer Solution Areas.  Reference and describe common RSA Archer Use Cases.  Describe each RSA Archer Solution module and summarize key fe