Upload
alex-mejia
View
219
Download
0
Embed Size (px)
Citation preview
8/19/2019 h12172 Ds Rsa Education Services Catalog
1/81
S e r v i c e s C a t a l o g – Q 4 2 0 1 5
RSA CUSTOMER EDUCATION CATALOG
8/19/2019 h12172 Ds Rsa Education Services Catalog
2/81
COURSE DESCRIPTION INDEX
RSA, The Security Division of EMC 2
Identity and AccessManagement
RSA Access Manager Administration, Installation and Configuration ........................................... 9
RSA Via Lifecycle and Governance Administration ..................................................................... 11
RSA Business Role Manager ..................................................................................................... 13 RSA Data Access Governance Basics ........................................................................................ 15 RSA Authentication Manager Administration ............................................................................. 16
RSA Authentication Manager Installation and Configuration ...................................................... 18RSA SecurID Help Desk Basics ..................................................................................................20
RSA Authentication Manager 6.1 to 8.x Data Migration ...................... ........................................ 22Migrating RSA Authentication Manager v6.1 to a v8.1 Hardware Appliance ................................. 22RSA Authentication Manager 7.1 to 8.x Data Migration ..................................................... .......... 24Migrating RSA Authentication Manager v7.1 to a v8.1 Hardware Appliance ................................. 24
Governance, Risk andCompliance
Getting Started with Enterprise Risk Management .....................................................................26
Getting Started with Policy and Compliance Management .........................................................28GRC Overview .......................................................................................................................... 30 RSA Archer Administration ................................................................ ........................................ 31
RSA Archer Advanced Administration ........................................................................................ 33RSA Archer Solutions Overview ........................................................ ........................................ 35
RSA Archer Security Operations (SecOps) Management Essentials ............................................. 37 RSA Archer Security Operations (SecOps) Management Solution Basics .................................... 39 RSA Archer Custom End-User Training Service ..................................................... ..................... 41
AdvancedSecurity Operations
RSA Data Loss Prevention Administration.......................................... ........................................ 43 RSA ECAT Fundamentals ........................................................ ................................................... 45 RSA Security Analytics Introduction ............................................................. ............................. 47
RSA Security Analytics 10.5 What’s New Overview ....... .............................................................. 49
RSA Security Analytics Foundations ..................................................................... ..................... 50RSA Security Analytics Core Administration ............................................................. .................. 52
RSA Security Analytics Hunting ................................................................................................. 54
RSA Security Analytics Introduction to Troubleshooting for Customers ....................................... 56
Anti Fraud
RSA Adaptive Authentication On-Premise Administration ....... ................................................... 58
RSA Adaptive Authentication for eCommerce Back Office Tools ....................................... ......... 60
RSA Adaptive Authentication 12 Migration ................................................................................62 RSA Web Threat Detection Essentials ........................................................................................64
Cyber Defense
RSA Intelligence-Driven Event Analysis..................................................................................... 66RSA Incident Handling and Response ...................................................................................... 68RSA Threat Intelligence .......................................................... ................................................... 70
RSA Malware Analysis .............................................................................................................. 72 RSA SOC Simulation Challenge ................................................................................................. 74RSA Cyber Defense Workshop ........................................................... ........................................ 75
Security Concepts andPrinciples
RSA Security Awareness Program ................................................................ .............................. 77 RSA CISSP Certification Boot Camp ........................................................................................... 79
Learning Assessments RSA Learning Assessments ............................................................... ....................................... 80
8/19/2019 h12172 Ds Rsa Education Services Catalog
3/81
RSA, The Security Division of EMC 3
The Value of
Professional Education
Investing in training and education
makes good business sense and can
have a profound impact on your
team. It enables an organization to:
– Decrease operating costs and
increase productivity
– Reduce technical infrastructure
costs
– Increase effectiveness of your
technology investment
– Reduce your organization’s overall
information risk
How to Contact Us
Online www.emc.com/rsa-training
E-mail [email protected]
Phone: 800-995-5095
International: 781-515-7700
Fax: 781-515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730 USA
ENABLE YOUR TEAM TODAY FOR TOMORROW’S IT SECURITY CHALLENGES
RSA Education Services provides practical and relevant courses that
support security learning across an enterprise. Properly trained
personnel are the lifeblood of any organization. As you implement
new technologies, add new functionality to existing systems or orient
new staff, education is a key element. Consistent and focused traininghelps maintain the security of your computing environment, improves
the end user experience and increases productivity and job
satisfaction among your staff.
NEW OFFERINGS
RSA Security Analytics
RSA Security Analytics courses have been updated for product version
10.5 and are now available as the following courses:
RSA Security Analytics Introduction (eLearning) [see page 47 ]
RSA Security Analytics 10.5 What’s New Overview [see page 49]
RSA Security Analytics Foundations [see page 50] RSA Security Analytics Core Administration [see page 52]
RSA Security Analytics Introduction to Troubleshooting for Customers
[see page 56]
And, with expected availabilty in late Q4, 2015:
RSA Security Analytics Hunting [see page 54].
RSA Via Lifecycle and Governance
The former RSA IMG Administration course has been revised in line
with the introduction of the RSA Via Lifecycle and RSA Via Governance
platforms. [see page 11]
RSA Archer
Two eLearning courses have been added to our offerings:
GRC Overview [see page 30]
RSA Archer Solutions Overview [see page 35 ]
FLEXIBLE DELIVERY OPTIONS
Instructor-Led Training (ILT)
Instructor-led classes offer comprehensive training in a fully-
equipped RSA Learning Center. Public classes give you the
opportunity to interact with your peers, further enhancing your
learning experience by sharing real-world tips and best practices.
Video Instructor Led Training (Video ILT) Video ILT courses combine the best of instructor-delivered lectures
and presentations with the convenience and flexibility of an on-
demand learning format. Video ILT programs are delivered in
streaming format and can be viewed by the student directly on their
own computer with an internet connection.
Online Instructor-Led Training (Online ILT)
Online ILT provides real-time, interactive, virtual training where
students participate online to access the instructor-led virtual
classroom. Lecture, discussion, questions and answers, and lab
exercises makes this a flexible training experience.
eLearning
Self-paced eLearning provides you with training that is generally one
to three hours in length giving you the convenience of learning at
your own pace.
8/19/2019 h12172 Ds Rsa Education Services Catalog
4/81RSA, The Security Division of EMC 4
RSA PRODUCT TRAINING
Our worldwide training services are targeted to serve professionals
who are responsible for installing, supporting and administering the
entire range of RSA solutions.
Developed for security administration and network operations, the
product courses offer a variety of teaching methods including
traditional instructor-led and virtual (“on line”) instructor-led training,
video-based learning, and elearning. Instructor-led courses can alsobe made available as on-site engagements at a customer’s location.
Each of these options gives you the flexibility to select a learning
mode that best fits your learning style, time constraints and budget.
RSA SECURITY AWARENESS PROGRAMS
RSA’s Security Awareness programs offer ways to test and measure
vulnerability, then provide essential education to fill any gaps. Our
Security Awareness training can target virtually every level of an
organization – raising awareness and offering concrete steps to effect
change, thus helping to prevent attackers from gaining a footholdthrough unsuspecting targets.
See individual program descriptions for further details.
CYBER DEFENSE TRAINING COURSES FORSECURITY ANALYSTS
The threat landscape is becoming more complicated every day. With
the advent and enhancement of technical innovations like cloud
computing, social media, mobile devices and big data, organizations
are finding it very difficult to keep ahead of advanced threats.
Security products, while necessary, can only go so far in identifying
and mitigating potential breaches. A skilled security analyst is key tothe success of any Information Security strategy.
The RSA Cyber Defense Training courses address these challenges by
offering comprehensive training on analytic processes and techniques
that are independent of a specific attack technique or security
product. These courses focus on analysis skills that are directly
relevant to the current security climate. The curriculum also provides
a path for security analysts to advance their skills by offering an
approach based on roles that are generally consistent with the roles
and responsibilities of a SOC.
8/19/2019 h12172 Ds Rsa Education Services Catalog
5/81RSA, The Security Division of EMC 5
Benefits of Onsite
Training
Substantial cost Savings
– Save up to 40% compared to
individual public class rates
Less student down time
– Reduce travel concerns and
out-of-office time
Convenient, Flexible
Scheduling
– Your training can be scheduled
at the time and location most
convenient for you
Benefits of Online
Instructor-led Training
– No travel cost or travel time
– Live instructor with whom you
can interact and ask questions
– Same content as the classroom
version of the course withhands-on labs to reinforce
concepts
– Modest connectivity
requirements allow participation
from anywhere
– Publicly-scheduled classes for
individual participants or Private
sessions for organizations
that prefer virtual training for
their dispersed teams
ONSITE TRAINING
With RSA Onsite training, you and your people aren’t locked into a
pre-existing schedule of public classes at a pre-existing location. RSA
Education Services can work with you to schedule your training at the
time and location that’s most convenient for you. That means training
doesn’t have to conflict with your other business priorities – and it can
be timed precisely to support your RSA implementation.
RSA Onsite training rates can save an organization up to 40% whencompared to individual student rates. Additional cost savings are
realized by eliminating the need for student travel. What’s more, since
your students are not preparing for trips – or making their way back
from airports after training – they are likely to be more productive and
accessible in the days surrounding their training experience.
ONLINE INSTRUCTOR-LED TRAINING
What is Online ILT?
Online ILT is real-time virtual training conducted remotely by RSA
instructors. It’s virtual training that mirrors the classroom experience
with:
Live web casts. During scheduled web casts, students communicate
with their RSA instructor and other students, ask questions, and
experience RSA products through live demonstration.
Hands-on labs. Students access a remote lab environment that
enables them to interact with RSA software and practice what
they’ve learned.
Course materials. Course materials are shipped to participants in
advance of the class. Just like in a classroom, students use these
materials under the guidance of the instructor.
Instructor guidance. During class time, students have the benefit of
the instructor’s expertise to assist during the live web casts andHands-on Labs. During lab time, the instructor can shadow students
by virtually looking over the shoulder of each student to evaluate
their progress and provide assistance.
RSA LEARNING ASSESSMENTS
As organizations increasingly depend on technology to manage their
businesses, the need for employees to be knowledgeable about
security is increasingly evident. Whether they are IT security
professionals or general office staff, having the appropriate security
knowledge and skills to perform their jobs is a critical business driver.
To plan and position your security training initiatives cost-effectively,RSA Learning Assessments are tools to measure your team’s
knowledge of RSA products and other security-related concepts. Based
on the learning assessment results, we can work with you to identify a
learning program that works for you and your team.
RSA Learning Assessments are useful for organizations who recognize
a need for training but aren’t quite sure what training their team really
needs. By leveraging RSA Learning Assessments, you can better
understand the learning gaps and make an informed decision about
the most effective individual and group training plans for your team.
Online RSA Learning Assessments are available to you at no charge.
An assessment can be completed within 15-20 minutes withimmediate results provided to the assessment taker. For a team
assessment, management reports can be provided that evaluates
individual and group results.
8/19/2019 h12172 Ds Rsa Education Services Catalog
6/81RSA, The Security Division of EMC 6
RSA Training Unit
Details:
– Each Training Unit has a value
of $100 US
– Valid for customers and
partners in all regions
– Can be used to register one or
more individuals– Can be redeemed for any RSA
course and any delivery mode
– Valid for one year (364 days)
from time of issuance. Any
unused days are null and void
after the expiration date
– Payment can be made with:
purchase order, credit card, or
company check
Registration and
Payment
Please complete your
registration at
www.emc.com/rsa-training. Be
sure you register with the e-mail
address of the student attending
class, as this is the only unique
identifier we have for each
student.
Complete details regarding
payment by purchase order,
credit card or check are provided
on our web site.
RSA TRAINING UNITS
Training is an invaluable means of facilitating growth in your
organization and increasing the skills and knowledge of your
employees. With RSA Training Units (TUs) you can invest in RSA
courses and use them whenever RSA training is necessary.
Training units are simply RSA Education Services currency. They are
deposited into a company’s training account and are available for
general consumption by your company’s employees. Valid for oneyear from date of purchase, pre-paid TUs provide maximum flexibility
to ensure your team’s readiness.
With RSA TUs you can satisfy your training requirements as they
evolve throughout the year. You reduce the paperwork and approvals
associated with multiple enrollments by taking care of all your training
needs with a single purchase.
RSA CERTIFIED SECURITY PROFESSIONALCERTIFICATION
By becoming an RSA Certified Security Professional, you possess the
credentials that demonstrate your knowledge and skills necessary to
function as a practical expert in the rapidly growing information security
industry. Job-based certifications are available for administrators for the
product areas designated below. Our relationship with Pearson VUE,
which operates 5,000 testing centers in 165 countries, provides
convenient access to certification exams and ensures impartial testing.
The RSA Certified Administrator specialization is designed for
professionals who administer and maintain enterprise security systems
that use RSA SecurID®, RSA Archer®, or RSA® Security Analytics.
Certification Recommended RSA Courses
RSA Archer CertifiedAdministrator
RSA Archer Administration
RSA Archer Advanced Administration
RSA SecurID CertifiedAdministrator
RSA Authentication Manager Administration
RSA Authentication Manager Installation and
Configuration
RSA Security AnalyticsCertified Administrator
RSA Security Analytics Administration
EMC2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in theUnited States and/or other countries. All other trademarks used herein are the property of their respective owners.© Copyright 2014 EMC Corporation. All rights reserved. Published in the USA.
EDCAT SB 0615 r1
8/19/2019 h12172 Ds Rsa Education Services Catalog
7/81
SUMMARY OF OFFERINGS BY DELIVERY MODE
7
ILT VILT e-Learning Online ILT
Identity and Access Management
RSA Access Manager Administration, Installation and Configuration
RSA Via Lifecycle and Governance Administration
RSA Business Role Manager
RSA Data Access Governance Basics
RSA Authentication Manager Administration
RSA Authentication Manager Installation and Configuration
RSA SecurID Help Desk Basics
RSA Authentication Manager 6.1 to 8.x Data Migration
Migrating RSA Authentication Manager v6.1 to a v8.1 HardwareAppliance
RSA Authentication Manager 7.1 to 8.x Data Migration
Migrating RSA Authentication Manager v7.1 to a v8.1 Hardware
Appliance
Governance, Risk and Compliance
Getting Started with Enterprise Risk Management
Getting Started with Policy and Compliance Management
GRC Overview
RSA Archer Administration
RSA Archer Advanced Administration
RSA Archer Solutions Overview
RSA Archer Security Operations (SecOps) Management Essentials
[Expected availability: early Q4 2015]
RSA Archer Security Operations (SecOps) Management Solution
Basics
RSA Archer Custom End-User Training Service
Advanced Security Operations
RSA Data Loss Prevention Administration
RSA ECAT Fundamentals
RSA Security Analytics Introduction
RSA Security Analytics 10.5 What’s New Overview
RSA Security Analytics Foundations
RSA Security Analytics Core Administration
RSA Security Analytics Hunting
[Expected availability: late Q4 2015]
RSA Security Analytics Introduction to Troubleshooting for
Customers
8/19/2019 h12172 Ds Rsa Education Services Catalog
8/81
SUMMARY OF OFFERINGS BY DELIVERY MODE (CONTINUED)
8
ILT VILT e-Learning Online ILT
Anti Fraud
RSA Adaptive Authentication On Premise Administration
RSA Adaptive Authentication for eCommerce Back Office Tools
RSA Adaptive Authentication 12 Migration
RSA Web Threat Detection Essentials
Cyber Defense
RSA Intelligence-Driven Event Analysis
RSA Incident Handling and Response
RSA Threat Intelligence
RSA Malware Analysis
RSA SOC Simulation Challenge
RSA Cyber Defense Workshop
Security Concepts and Principles
RSA Security Awareness Program
RSA Certified Information Systems Security Professional (CISSP)
Boot Camp
8/19/2019 h12172 Ds Rsa Education Services Catalog
9/81
9
RSA® Access Manager Administration,
Installation and ConfigurationCourse Description
Overview RSA Access Manager system architecture, server structure, integration of components
into an enterprise infrastructure, user organization, and the importance of various
configuration parameters are discussed. Hands-on labs allow the student to work step-by-
step through the phases of an RSA Access Manager implementation.
Extensive hands-on labs and the use of a realistic case study reinforce the tasks involved
in creating a complete Web access management solution.
Audience System, security, or help desk personnel who need to install, deploy and/or maintain RSA
Access Manager.
Duration 4 days
Prerequisite Knowledge/Skills
Familiarity with Web and directory server or database technologies; A functionalknowledge of OS and networking fundamentals.
Course Objectives Upon successful completion of this course, participants should be able to:
Explain the basic architecture and integration of RSA Access Manager in an enterprise
environment
Describe the processes and methodology for performing a successful installation and
implementation of the core servers, data adapter, Administrative Console and
representative Agents
Describe the management functions used for resource and end user administration
Using a case study, perform typical administration functions to populate and
configure users, administrators and groups in an RSA Access Manager database
Explain the configuration parameters that can be used to tailor the RSA Access
Manager components to accomplish specific tasks and functions
Establish Entitlements and use RSA Access Manager Smart Rules™ to manage Web
access and protect resources in a classroom Web environment
Perform system troubleshooting and analysis through the use of audit logs and user
reports
Explore how runtime and administrative operations can be extended through the use
of the API library
AT-A-GLANCE
This course offers
theoretical and hands-on
instruction in the
administrative functions,
operations, andinstallation and
configuration tasks
associated with the RSA
Access Manager product.
REGISTER FOR CLASSES:
For an up-to-date scheduleof Instructor-led classes and
other training options, visit
the RSA Training and
Certification web site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts
01730
COURSE PART NUMBERS:
ED CLRAIN210 – Onsite Class
ED ACCMGR TRAIN UNIT –
Training Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
10/81
10© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
RSA Access Manager Overview
▬ High level description of RSA Access Manager
and its contribution to access management
RSA Access Manager Architecture
▬ Description and functions of the Primary
Servers; Web and Application Server Agents
▬ Data Flow for the Runtime and Administrative
operations
▬ Description of how RSA Access Manager fits
into a distributed security model
Installation and Configuration
▬ Description of RSA Access Manager system
requirements and pre-installation readiness
tasks
▬ Installation procedure, options, and
recommended practices
▬ Installation of Access Manager Servers, LDAPData Adapter, Administrative Console, and
Web and Application Server Agents
▬ Configuration of Web Server for Single Sign-
On
Managing Resources
▬ Discussion of how resources (Web sites,
Applications, etc.) are protected using RSA
Access Manager – focusing on selectivity and
granularity in various situations
▬ Registration of Web Servers and definition of
Applications
▬ Discussion of Virtual Web Server Hosts
▬ Configuration of Web Server for virtual hosts
Delegated Administration
▬ Discussion of the administrative structure that
is possible in an RSA Access Manager
installation
▬ Use of Administrative Groups and ownership
hierarchy of administrators, users, and objects
▬ Examination of Administrative Roles and
responsibilities
Managing the Organization▬ Policy control for user authentication and
passwords
▬ Methodology of structuring users, groups, user
attributes, and properties
Creation of user properties and addition of
users to groups
Resource Protection and Authentication
▬ Discussion of Authentication Methods used to
protect resources; Form-based vs.
challenge/response authentication; Chaining
and combining forms
▬ Discussion of how resources are defined to
allow granular protection
▬ Use of RSA Access Manager Entitlements and
Smart Rules to selectively manage access to
resources
▬ How to manage conflicts among Smart Rules
and between Smart Rules and Entitlements
▬ Configuration of Access Manager for external
authentication and URL retention
Troubleshooting
▬ Examination of the log files and use of special
configuration parameters to control log detail
▬ Configuration of servers for centralized
logging
▬ Configuration of Network Management
▬ Discussion of approaches to user and system
troubleshooting
Development Tools
▬ Discussion of the various Runtime,
Administrative, and Web Agent Extension API
tools that are available
▬ Examination and implementation of JAVA
coding examples
Single Sign-On
▬ Discussion of the function and objectives of
creating a single sign-on environment
▬ Explanation of the differences and challenges
of ‘Intra-’ vs. ‘Inter-’ site single sign-on
▬ Configuration of Access Manager for SSO and
ISSO
Distributed Authorization
▬ Discussion of achieving redundant
functionality and failover
▬ Explanation of the differences in Standard
Mode vs. Distributed Mode failover
▬ Test of centralized logging
8/19/2019 h12172 Ds Rsa Education Services Catalog
11/81
11
RSA® Via Lifecycle and Governance
Administration Course Description OverviewThis course provides an overview of the administrative responsibilities and configuration
options associated with the RSA Via Lifecycle and Governance (RSA Via L & G) platform.
Students will gain a comprehensive understanding of the access review cycle, change
request and provisioning capabilities of the platform. Students will enable the ACM, ARM,
AFX and Rules modules. Hands-on labs are used to reinforce the tasks involved in
configuring, maintaining, and utilizing the platform to collect identities, accounts,
entitlements and application roles for several directories and applications as well as
perform user and account reviews and other tasks in a simulated review cycle. Students
will configure the components necessary to automate provisioning and new user
registration processes and will create workflows, notifications, and several types of
change requests. Students will discuss collectors, applications, directories, business
descriptions, roles, rules, provisioning options, reporting and dashboards to provide an
end-to-end structured experience for the students.
AudienceRSA Via Lifecycle and Governance (formerly RSA IMG) platform administrators,
implementers and other technical users who need to configure, administer, or support the
RSA Via Lifecycle and Governance platform.
Duration
4 days
Prerequisite Knowledge/SkillsFamiliarity with Identity Management concepts, Active Directory, LDAP, and SQL
querying.
Course ObjectivesUpon successful completion of this course, participants should be able to:
List the components included in the RSA Via L&G platform
Understand platform configuration options
Enable the ACM, ARM, Roles, AFX and Rules modules
Package and import platform resource objects
Perform administrative functions, including configuring identity, account, and
entitlement collectors, and unifying user data
Configure and process business policy sets, rules, notifications and workflows
Configure, run, and perform user access certification reviews
Configure and take action on change requests, user registrations, and workflows for
requests
Deploy automated provisioning options for change requests and user registrations
Create and publish reports and charts to dashboards and external sources
AT-A-GLANCE
The RSA Via Lifecycle and
Governance Administration
course provides an
overview of the
administrative andconfiguration options
associated with the RSA Via
Lifecycle and Governance
platform.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED-VLG-ADM-110 – Public class
ED-VLG-ADM-210 – Onsite
class
ED-VLG-ADM-TRAINUNIT –
Training Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
12/81
12© Copyright 2015 EMC Corporation. All rights reserved. 09/2015EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Introduction to RSA Via L&G
▬ RSA Via L&G Platform Overview
▬ Course scenario overview
▬ Data model overview
▬ Prestige Simulation
Administration Overview▬ AveksaAdmin account
▬ Admin menu
▬ Enabling platform modules
▬ Enabling Notifications
▬ Help system
▬ Task list
▬ UI Security
RSA Via L&G Platform User Interface
▬ Admin System Settings
▬ User Interface styles
▬ Naming your environment
▬ Login Screen
▬ Header and Menu Bar
▬ Packaging and Importing
Requirements Gathering
▬ Business Resources
▬ Directories and Applications
▬ Out of the Box Attributes
▬ Custom Attributes
▬ Custom Values Lists
▬ Collected VS. ACM Managed Attributes
▬ Hiding attributes
▬ Table options
Users and Identities
▬ Users and Identities Overview
▬ Directories
▬ Directory Groups
▬ Business Units
▬ Identity Data Collectors
▬ Unification Process
▬ Collecting Identities
▬ Authentication
Accounts, Roles and Entitlements
▬ Aveksa Admin roles
▬ Granular Aveksa Admin Privileges
▬ Rapid Application Onboarding
▬ Account Attributes
▬ Account Data Collectors
▬ Orphaned Accounts
▬ Entitlement Attributes
▬ Entitlement Data Collectors
▬ Application Roles
▬ Business Descriptions
▬ Collecting Entitlements
▬ Collecting multiple owners for resources
Roles
▬ Roles Overview
▬ Collecting Application Roles
▬ Roles module vs. BRM
Rules
▬ Rules Overview
▬ Rule Definitions
▬ Out of the box Rules
▬ Creating custom rules
▬ Rules logic
▬ Processing Rules
▬ Violations, Remediations and exceptions
▬ Out of the box and custom rules workflows
▬ Granular security for rules
Reviews
▬ Reviews Overview
▬ Creating Review Definitions
▬ Modifying reviews workflows
▬ Administering Reviews
▬ Performing Reviews
▬ Refreshing Reviews
▬ Watch closures
▬ Completing a Review and Reporting Results
Workflows, Notifications and Escalations▬ Workflows Overview
▬ Creating Workflows
▬ Out of the box templates
▬ Creating Notification templates
▬ Creating Escalations
▬ Viewing email logs
Dashboards and Reports
▬ Reports Overview
▬ Out of the box reports and charts
▬ Modify OOTB reports using the query tab
▬ Build Custom Reports and Charts
▬ Dashboard options
▬
Build and modify dashboards Access Request Manager
▬ Access Requests Manager Overview
▬ Custom Forms and controls (fields)
▬ Custom Buttons
▬ Naming policies and naming transforms
▬ Custom User and Entitlement Views
▬ Workflows, Notifications and Escalations
▬ Provisioning options
Provisioning with AFX
▬ Access Fulfillment Express Overview
▬ Deploying Access Fulfillment Express
▬ Importing AFX Connectors
▬ Configuring Connectors
▬ Configuring Endpoint capabilities
Capstone Structured Experience
▬ Complete end-to-end access review cycle
▬ Deploy change requests with automated
provisioning
▬ Publish final reports to simulation auditorsand executives
Additional Resources
▬ Community membership
▬ RSA Secure Care Online
8/19/2019 h12172 Ds Rsa Education Services Catalog
13/81
13© Copyright 2014 EMC Corporation. All rights reserved. 03/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
RSA® Business Role ManagerCourse Description
OverviewThe RSA Business Role Manager eLearning module extends the capabilities of the IMG
product to include the ability to group users and entitlements into roles. The RSA BRM
eLearning module provides an overview of BRM components. Topics include terminology,
configuration, and role mining options to tailor the module to a customer’s needs .
Demonstrations illustrate the tasks involved in configuring, maintaining, and utilizing the
Business Role Manager module.
The course is comprised of lecture content as well as recorded product demonstrations to
illustrate the RSA BRM product in action.
AudienceRSA Identity and Access Management/Identity Management and Governance/RSA Via
Lifecycle and Governance administrators, implementers and other technical users who
need to configure, administer, or support the RSA Business Role Manager module.
Duration4 hours (eLearning)
Prerequisite Knowledge/SkillsCompletion of the RSA Identity Management and Governance (IMG) course (or former
RSA ACM Foundations course).
Course ObjectivesUpon successful completion of this course, participants should be able to:
Enable the Roles option and Business Role Manager module
Understand the functionality and capabilities of the Roles and Business Role Managermodules
Understand Business Role Manager terminology Understand the differences between business, technical, and global roles Interpret role metrics are produced Create, configure and manage roles Create and configure role options Create and configure role sets Discover roles and entitlements
Define role membership rules
Manage organization roles for compliance to best practice principles Allow others to manage roles
AT-A-GLANCE
The RSA Business Role
Manager eLearning provides
instruction on the
administrative
responsibilities and
configuration options
associated with the RSA
Business Role Managermodule.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED-VLG-ADM-TRAINUNIT –
Training Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
14/81
14© Copyright 2014 EMC Corporation. All rights reserved. 12/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Business Role Manager Overview
▬ BRM Features
▬ Definition of a Role
▬ Benefits of using Roles in Access Governance
▬ Difference between Business Roles and
Technical Roles
Enable and Configure BRM
▬ How to enable BRM.
▬ Role configuration options
▬ Role management options
Create a Role
▬ Best practices for creating a role
▬ Definition of a birthright role
▬ How to create a role
▬ Definition of a role set
▬ How to create a role set
▬ How to add members to a role
▬ Role membership rules
▬ Role metrics
Discover Roles
▬ Benefit of role discovery
▬ Definition of top-down role modeling
▬ Demonstration of top-down role modeling
▬ Definition of bottom up role modeling
▬ Demonstration of bottom-up role modeling
Manage Roles
▬ Role management lifecycle
▬ Common indicators of role problems
▬ Using roles in entitlement reviews
▬ Interpreting role metrics
8/19/2019 h12172 Ds Rsa Education Services Catalog
15/81
15
RSA® Data Access Governance BasicsCourse Description
OverviewThis eLearning course discusses the use of the RSA Data Access Governance module as a
tool to collect and manage user access to data resources. Topics include collection
configuration, access reviews, user access requests, and data resource ownership.
Recorded demonstrations (eLearning) reinforce the tasks involved in configuring,
maintaining, and utilizing the Data Access Governance module.
AudienceRSA Identity and Access Management/Identity Management and Governance
administrators, implementers and other technical users who need to configure,administer, or support the RSA IMG Business Role Manager module.
Duration2 hours (eLearning)
Prerequisite Knowledge/SkillsCompletion of the RSA Identity Management and Governance (IMG) Administration
course (or former RSA ACM Foundations course).
Course ObjectivesUpon successful completion of this course, participants should be able to: Enable the RSA Data Access Governance (DAG) module
Understand how RSA DAG and StealthBits® StealthAUDIT® work together to collect
data resource information
Manage reviews of resource owners and user access
Configure rules to support an organization’s user access policies
Configure and manage end user data access requests
Course Outline
Purpose and function of RSA Data Access Governance
▬ Use and benefits of RSA DAG
▬ Permission types
▬ DAG operations
RSA DAG Architecture
▬ Components and functions
▬ Data flows
Process and Workflows
▬ Data acquisition
▬ Review workflow
▬ Rules and rule processing
▬ End user data access requests
AT-A-GLANCE
The RSA Data Access
Governance Basics
eLearning course provides
instruction on the
administrative
responsibilities and
configuration options
associated with the RSAData Access Governance
module.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED-VLG-ADM-TRAINUNIT –
Training Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
16/81
8/19/2019 h12172 Ds Rsa Education Services Catalog
17/81
17© Copyright 2014 EMC Corporation. All rights reserved. 12/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Product and Technology Overview
▬ High level description of RSA Authentication
Manager and its contribution to user
authentication
▬ Authentication as a foundation of security,
trust and confidence in digital identities
▬ RSA Authentication Manager system
components and communication
RSA SecurID Authentication
▬ RSA SecurID authentication options
▬ Concepts of strong user authentication
▬ Token technology – time synchronization,
authenticator types
Risk-Based Authentication
▬ Configuration and management of Risk-
based authentication
▬ Device fingerprinting and behavior data
collection and analysis
▬ Selecting assurance levels
Deployment and Administrative Structure
▬ Deployment planning and establishing an
administrative structure
Policy Management
▬ Defining and applying policies to the system
and Security Domains
- Password and Token policies
- Lockout and self-service policies
- Risk-based and Offline authentication
policies
System Administration
▬ Establishing and maintaining organizational
and administrative structures:
- LDAP Identity Sources
- Security Domains
- User and User Group structures
- Administrative roles and delegation
- Authentication Agents
Authenticator Management
▬ Managing RSA SecurID hardware tokens
▬ Software token deployment and installation
▬ Managing Risk-Based Authentication
▬ Managing On-Demand Authentication
Auditing, Reports and Troubleshooting
▬ RSA Authentication Manager report functions
▬ Report customization
▬
Troubleshooting procedures
Self-Service Management and Support
▬ Configurations for user self-service functions
▬ User account and authenticator management
and provisioning
8/19/2019 h12172 Ds Rsa Education Services Catalog
18/81
18
RSA® Authentication Manager
Installation and ConfigurationCourse Description
OverviewThis course assumes that the student has attended the RSA Authentication
Manager Administration course or has equivalent operation and administrative
experience with RSA Authentication Manager – administrative tasks are not
covered as part of this course.
AudienceTechnical personnel who install, service and support RSA Authentication Manager
and RSA SecurID deployments.
Duration2 days
Prerequisite Knowledge/SkillsMicrosoft® Windows® or UNIX/Linux system administration; attendance in RSA
Authentication Manager Administration course, or equivalent v7.1 or v8
administration experience; Familiarity with virtual machine deployment onVMware.
Course ObjectivesUpon successful completion of this course, participants should be able to:
Plan and perform the pre-installation, installation, and configuration tasks to
accomplish an RSA Authentication Manager virtual appliance installation in a
VMware environment
Configure RSA Authentication Manager system parameters
Configure and connect to external LDAP Identity Sources
Create redundant/failover RSA Authentication Manager replica servers and
understand the role and management of replica server instances
Install and configure RSA Authentication Agents for local workstation and webaccess protection
Perform an RSA Authentication Manager Web Tier installation to support user
self-service and risk-based authentication
AT-A-GLANCE
This course offers hands-on
training on the installation
and configuration of RSA
Authentication Manager,
Authentication Agents, WebTier, and other RSA
SecurID® system
components..
REGISTER FOR CLASSES:
For an up-to-date schedule ofInstructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED AMINS210 – Onsite Class
ED AM TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
19/81
19© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
RSA Authentication Manager
System Architecture
▬ Primary and Replica instances
▬ Authentication Agents and communication
paths
▬ Identity Sources
▬ Firewall configurations
▬ Web Tier component
▬ RADIUS communication
Deployment Scenarios and Planning
▬ Deployment and Installation planning
▬ Using the right Authentication Agent
▬ Planning administrative support
▬ Using CT-KIP for software token deployment
RSA Authentication Manager Deployment
▬ Pre-Installation requirements and
considerations▬ Supported VMware environments and
features
▬ V8.1 Hardware Appliance deployment
▬ Deployment process and steps
▬ Post-deployment tasks
System Configurations
▬ Settings and configurations
- System-wide configurations
- Instance settings
- Console and dashboard personalization
Authentication Agent Configurations▬ Functions and features of representative
Authentication Agent installations for
Microsoft Windows and Linux operating
systems
▬ Configuring Agent software for local,
network and web access protection
▬ Handling node secret and sdconf.rec files
Replica Instances
▬ Strategies for dealing with primary instance
failures and replica promotion
▬ Creating replica packages
▬ Establishing preferred and failover servers in
Agent hosts
Web Tier Installation
▬ Requirements and installation process for the
Web Tier component
▬ Customizing the end user interface
System Utilities
▬ Using the Command-line Utility package
▬ Installing and configuring the Windows MMC
snap-in
▬ Managing Realm trusts
Credential Manager Configuration
▬ Setting up the Credential Manager for
provisioning
RADIUS Server Configuration
▬ RADIUS functions and capabilities
▬ Primary and Replica RADIUS servers
▬ Managing RADIUS users
RSA Authentication Manager Migration Overview
▬ Optional overview of the migration process
from version 6.1 to version 8 and/or version
7.1 to version 8
▬ This module is delivered if students are
planning to perform a migration in their
production system and are interested in the
general planning and steps involved in a
migration
8/19/2019 h12172 Ds Rsa Education Services Catalog
20/81
20
RSA SecurID® Help Desk BasicsCourse Description
OverviewAn overview of RSA Authentication Manager and RSA SecurID authenticators and
authentication methods are presented, as well as how functions and controls are
accessed in the administrative interface. Instructor demonstrations of important
operations relating to typical end user cases reinforce the steps that Help Desk
representatives can take for troubleshooting and assisting their user population.
This course is useful for new representatives supporting RSA SecurID users as well
as a refresher course for representatives who infrequently work with RSA SecurID
support issues.
AudienceHelp Desk representatives who need to assist and support RSA SecurID users
Duration1 day
Prerequisite Knowledge/SkillsGeneral familiarity with system administration functions
Course ObjectivesUpon successful completion of this course, participants should be able to:
Understand the high-level architecture and theory of operation of the RSA
SecurID product suite
Identify common authentication problem areas
Perform common user assistance tasks
Understand the use of the user Self-service capabilities
AT-A-GLANCE
This course provides the
fundamental information
about an RSA SecurID®
system deployment to assist
Help Desk representatives
respond to end users.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED AM TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
21/81
21© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
The following modules are designed to support thecourse objectives:
RSA SecurID System Overview
▬ High level description of RSA SecurID and
RSA Authentication Manager system
components
▬ RSA authentication methods:
o Hardware and Software authenticators
o On-Demand Authentication
o Risk-Based Authentication
▬ Authentication process and data flow
Authentication Problem Areas
▬ Identifying and isolating user problems
▬ Common user errors
▬ Differentiating User vs Agent vs Server
problems
System Configurations
▬ Organizational structures – users, groups,
Security Domains and Identity Sources
▬ Authentication options and policies
Authenticator Operations
▬ Hardware tokens
▬ Software tokens
▬ On-demand codes
▬ Emergency and temporary codes
Monitors and Reports
▬ Using the Authentication Monitor
▬ Generating reports to track and user activity
User Troubleshooting
▬ Troubleshooting procedures
▬ Security considerations
Self-service Console
▬ User self-service functions
▬ Self-Service provisioning flow
▬ Troubleshooting user self-service problems
8/19/2019 h12172 Ds Rsa Education Services Catalog
22/81
22
RSA® Authentication Manager 6.1 to
8.x MigrationCourse Descriptions
OverviewProduct functionality that is pertinent to the migration of v6.1 is discussed as well
as the process and considerations for migrating to a v8.x environment.
Note that this course discusses migration of “out-of-box” deployments and does
not address migration of customized APIs running under v6.1.
AudienceTechnologists who are responsible for an RSA SecurID system and intend on
migrating from RSA Authentication Manager v6.1 to v8.
Prerequisite Knowledge/SkillsFamiliarity with RSA SecurID technology and RSA Authentication Manager v6.1.
RSA Authentication Manager 6.1 to 8.0 Data MigrationThis course describes the features and functions that are new to RSA
Authentication Manager v8.x as well as how database objects and structures map
from v6.1 to v8.x. It details several deployment and migration scenarios and thesteps required to migrate v6.1 data to a v8.x installation.
Duration
Approximately 1 hour
Migrating RSA Authentication Manager v6.1 to a v8.1Hardware ApplianceThis course augments the data migration course (described above) and focuses on
the process and considerations for migrating to a version 8.1 hardware appliance
from v6.1.
DurationApproximately 15 minutes
This elearning course is available to customers at no charge.
If you are accessing RSA eLearning for the first time, please visithttp://powerlink.emc.com to establish an account.
If you already have an account through EMC Powerlink, go directly towww.emc.com/rsa-training to access this course.
AT-A-GLANCE
This eLearning course
guides the participant
through the steps to
accomplish a standard
migration from RSAAuthentication Manager
version 6.1 to version 8.x.
REGISTER FOR CLASSES:
For an up-to-date schedule ofInstructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
8/19/2019 h12172 Ds Rsa Education Services Catalog
23/81
23© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
RSA Authentication Manager 6.1 to 8.0Data Migration
Course ObjectivesUpon successful completion of this course,
participants should be able to:
Provide an overview of the fundamental
differences between RSA Authentication Manager
v6.1 and v8.x – features and functions
Describe the specific database objects that are
migrated between product versions and how they
are handled by the migration
Describe the pre-migration steps to prepare a
v6.1 database for migration
Describe the post-migration structures that can
be created in v8.x to contain and manage
migrated objects
Course Outline Comparison of v6.1/v8.x Architecture and
Administrative Structures
▬ Describes the general architecture and
compares differences/parallels between
product versions
▬ Describes the major areas of importance in
the v8.x data structures and how they map
to a v6.1 environment
▬ Describes terminology used in v8.x
Overview of the Migration Process
▬
High-level description of the methodologyfor approaching a migration
▬ Describes in detail how database objects are
mapped from version to version
Pre-Migration Preparation
▬ Describes the considerations and best
practices involved in preparing a v6.1
environment for migration — database
cleaning, creating/dismantling structures,
etc. and preparing a v8.x environment to
receive migrated information — what
decisions and elements should be made
before migration
Post-Migration Considerations
▬ Description of tasks that can be performed
after the completion of the migration
process
Migration of an RSA SecurID Appliance
▬ Describes the general process for migrating
data from a v6.1 RSA SecurID Appliance to
a v8 environment
Migrating RSA Authentication Managerv6.1 to a v8.1 Hardware Appliance
Course ObjectivesUpon successful completion of this course, participants
should be able to:
Understand a deployment architecture that
includes one or more v8.1 hardware appliances as
primary and/or Replica instances
Describe the migration process of migrating from
a v6.1 software or hardware appliance platform to
a v8.1 hardware appliance
Course Outline Overview of v8.1 Architecture
▬ Describes the architecture and deployments
options that include a v8.1 hardware
appliance
Overview of the Migration Process
▬ Describes migration tasks involved with
migrating to a hardware appliance that are
over and above the tasks involved with data
migration alone
▬ Using the v6.1 Migration Assessment Tool
Migration Steps
▬ Describes the initial connections and setup of
a v8.1 hardware appliance
▬ Describes the steps involved with migration
from exporting v6.1 data to importing it into a
v8.1 hardware appliance.
8/19/2019 h12172 Ds Rsa Education Services Catalog
24/81
24
RSA® Authentication Manager 7.1 to
8.x MigrationCourse Descriptions
OverviewProduct functionality that is pertinent to the migration is discussed as well as
virtual and hardware appliance deployment, Web Tier, and Risk-Based
Authentication options that are new in v8.x.
Note that these courses discuss migration of “out-of-box” deployments and do not
address migration of customized environments or APIs running under v7.1.
AudienceTechnologists who are responsible for an RSA SecurID system and intend on
migrating from RSA Authentication Manager v7.1 to v8.
Prerequisite Knowledge/SkillsFamiliarity with RSA SecurID technology and RSA Authentication Manager v7.1.
RSA Authentication Manager 7.1 to 8.0 Data MigrationThis course describes the features and functions that are new to RSA
Authentication Manager v8.x. It details several deployment and migrationscenarios and the steps required to migrate v7.1 data to a v8.x installation.
Duration
Approximately 1 hour
Migrating RSA Authentication Manager v7.1 to a v8.1Hardware ApplianceThis course augments the data migration course (described above) and focuses on
the process and considerations for migrating to a version 8.1 hardware appliance
from v7.1. The information in this course is appropriate for v7.1 deployments that
currently use hardware appliances as well as for migrations to v8.1 that will beginusing a hardware appliance for the first time.
Duration
Approximately 15 minutes
AT-A-GLANCE
This eLearning course
guides the participant
through the steps to
accomplish a standard
migration from RSAAuthentication Manager
version 7.1 to version 8.x.
REGISTER FOR CLASSES:
For an up-to-date schedule ofInstructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
This elearning course is available to customers at no charge.
If you are accessing RSA eLearning for the first time, please visithttp://powerlink.emc.com to establish an account.
If you already have an account through EMC Powerlink, go directly towww.emc.com/rsa-training to access this course.
8/19/2019 h12172 Ds Rsa Education Services Catalog
25/81
25© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
RSA Authentication Manager 7.1 to 8.0Data Migration
Course ObjectivesUpon successful completion of this course,
participants should be able to:
Provide an overview of the fundamental
differences between RSA Authentication Manager
v7.1 and v8 – features and functions
Describe the migration process
Describe the pre-migration steps to prepare for
v7.1 data export
Describe the post-migration tasks in a v8
environment
Course Outline Comparison of v7.1/v8 Architecture
▬ Describes the general architecture and
system components that are similar to v7.1
and those that are new to v8
Overview of the Migration Process
▬ High-level description of the options and
methodology involved with migration
▬ Discusses approaches to minimize downtime
during migration
Migration Steps
▬ Discusses pre-migration preparations
▬ Describes the v8 deployment
▬
Describes installation of the RSAAuthentication Manager Migration Export
Utility
▬ Describes Basic and Advanced migration
options
▬ Considerations for RADIUS migration
Post-Migration Tasks
▬ Describes tasks to be performed after the
completion of the migration process
▬ Discusses rolling back a migration
Migration Assistance
▬ Describes troubleshooting information andhow to obtain further assistance from RSA
resources
Migrating RSA Authentication Managerv7.1 to a v8.1 Hardware Appliance
Course ObjectivesUpon successful completion of this course, participants
should be able to:
Understand a deployment architecture that
includes one or more hardware appliances as
primary and/or Replica instances
Describe the migration process of migrating from
a software or hardware appliance platform to a
v8.1 hardware appliance
Understand how to upgrade an existing supported
hardware appliance to be v8.x-capable
Course Outline Overview of v8.1 Architecture
▬ Describes the architecture and deployments
options that include a v8.1 hardware
appliance
Overview of the Migration Process
▬ Describes migration tasks involved with
migrating to a hardware appliance that are
over and above the tasks involved with data
migration alone
Upgrading and Re-imaging an RSA SecurID
Appliance
▬ Describes the process to upgrade supported
RSA SecurID Appliance 3.0 equipment to
enable it to host a v8.x instance
Migration Steps
▬ Describes the steps involved with migration
from exporting v7.1 data to importing it into a
v8.1 hardware appliance.
8/19/2019 h12172 Ds Rsa Education Services Catalog
26/81
26
Getting Started with Enterprise Risk
ManagementCourse Description
OverviewStudents will gain knowledge of the key RSA Archer ERM components through
presentations and hands-on exercises.
AudienceRisk management team members who will be using the RSA Archer Risk
Management solution to define, support, and maintain a risk management
initiative. This may include managers, team leads, and anyone involved in scoping
a risk project.
Duration2 days
Prerequisite Knowledge/SkillsFamiliarity with RSA Archer eGRC framework and a general familiarity with
organizational Risk concepts.
Course ObjectivesUpon successful completion of this course, participants should be able to:
Explain basic Risk Management terminology and methodologies
Illustrate the structure of the RSA Archer Risk Management Solution
Define business requirements related to Risk Management
Begin the implementation process of an Enterprise Risk Management program
AT-A-GLANCE
This course provides an
overview of the concepts,
processes, and procedures
necessary to successfully
begin implementation of anEnterprise Risk Management
(ERM) system.
REGISTER FOR CLASSES:
For an up-to-date schedule ofInstructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED ARCERM210 – Onsite Class
ED ARC TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
27/81
27© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Introduction to Risk Management
▬ What is Risk?
▬ General Enterprise Risk Management
Approach Overview
▬ Types of Risk
Digging Deeper
▬ Common Frameworks Overview
▬ Developing a Common Risk Taxonomy
▬ Elements of Risk Management
▬ Phases of Growth:
▬ Risk Identification
▬ Assessment
▬ Decision
▬ Treatment
▬ Monitoring
RSA Archer Risk Management Solution
▬ RSA Archer ERM Structure Components
▬ ERM Processes and Key Integrations with
Other Solutions
▬ How RSA Archer Maps to Common Risk
Frameworks
Top-Down Risk Assessment
▬ Discussion: Common Issues for Specific
Industries/Business Types
▬ Exercise: Risk Identification
▬ Exercise: Risk Assessment
▬
Exercise: Risk Decision▬ Exercise: Risk Treatment
▬ Exercise: Metrics Monitoring
▬ Exercise: Loss Monitoring
▬ Exercise: Overall Monitoring
Bottom-Up Risk Assessment
▬ Exercise: Create a new Risk Project
▬ Exercise: Complete Risk Assessments
▬ Exercise: Create reports based on new data
▬ Exercise: Bring in sample model data via Data
Import
▬ Exercise: Create dashboard that incorporates
model data’s impact on business
8/19/2019 h12172 Ds Rsa Education Services Catalog
28/81
28
Getting Started with Policy and
Compliance ManagementCourse Description
OverviewStudents will gain knowledge of the key RSA Archer Policy and Compliance
Management components through presentations and hands-on exercises.
AudiencePolicy and Compliance management team members who will be using the RSA
Archer Policy and Compliance Management solution to define, implement, and
maintain a policy and compliance management initiative. This may include
managers, team leads, and anyone involved in consolidating policies and ensuring
compliance with authoritative sources.
Duration2 days
Prerequisite Knowledge/SkillsFamiliarity with the RSA Archer eGRC framework and a general familiarity with
policy and compliance concepts.
Course ObjectivesUpon successful completion of this course, participants should be able to:
Explain basic Policy and Compliance Management issues and processes
Illustrate the structure of the RSA Archer Policy and Compliance Management
Solution
Begin the implementation process of a Policy and Compliance Management
program
AT-A-GLANCE
This course provides an
overview of the concepts,
processes, and procedures
necessary to successfully
begin implementation of aPolicy and Compliance
Management system.
REGISTER FOR CLASSES:
For an up-to-date schedule ofInstructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED ARCPCM210 – Onsite class
ED ARC TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
29/81
29© Copyright 2013 EMC Corporation. All rights reserved. 08/2013EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Introduction to Policy and Compliance
Management
▬ Top Policy and Compliance Management
Issues
▬ Policy and Compliance Processes in a
Nutshell
▬ Policy and Compliance Key Components
RSA Archer Policy Management Solution
▬ RSA Archer Interface
▬ RSA Archer Policy Structure Components
▬ Phased Implementation Approach
▬ Post-Implementation Processes
Policy Management Exercises
▬ Exercise: Analyze Existing Policy
▬ Exercise: Define Scope
▬ Extraction & Mapping
▬ Exercise: Policy Extraction
▬ Exercise: Control Standard Extraction &
Mapping
▬ Exercise: Format/Import Content
▬ Exercise: Perform a Gap Analysis
▬ Exercise: Import Provided Content
▬ Exercise: Approve a Policy Change
▬ Exercise: Policy Awareness Campaign
RSA Archer Compliance Management Solution
▬ Sarbanes-Oxley Act Concerns
▬ RSA Archer Compliance Structure
Components
▬ How Compliance is Rated
▬
Exception Requests Workflow
Compliance Management Exercises
▬ Exercise: Review Control Procedure Mapping
▬ Exercise: Assess a Process Control
▬ Exercise: Assess a Technical Control
▬ Exercise: Address Findings – Remediation
Plan
▬ Exercise: Address Findings – Exception
Request
Compliance Strategies
▬ Control-Based Compliance
▬ Asset-Based Compliance
▬ Compliance Testing Cycle
▬ Round Table Discussion
▬ Additional Resources
8/19/2019 h12172 Ds Rsa Education Services Catalog
30/81
30© Copyright 2015 EMC Corporation. All rights reserved. 9/2015EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
GRC OverviewCourse Description
Overview
This self-paced eLearning course introduces the general concepts of Governance,
Risk and Compliance (GRC) from a business perspective. It focusses on why GRC is
important to business and how GRC impacts each area of a business.
Audience- RSA Customers
DurationApproximately 30 minutes (e-Learning)
Prerequisite Knowledge/SkillsNone
Course ObjectivesUpon successful completion of this course, participants should be able to:
Describe the elements that comprise Governance, Risk and Compliance Describe how GRC addresses business challenges Understand the impact of GRC on people and processes within the business
Course Outline Business pressures and risks
What is GRC?
Governance, Risk and Compliance strategies
How companies address GRC
Enterprise GRC
Stages of GRC adoption
GRC for IT organizations
Technology that supports GRC
AT-A-GLANCE
This e-Learning course
provides a general
introduction to Governance,
Risk, and Compliance
concepts.
This eLearning course is not
product specific.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED-ARC-TRAINUNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
31/81
31
RSA Archer® AdministrationCourse Description
OverviewStudents will gain knowledge of the key RSA Archer platform components such as
applications, security management, and communication tools through
presentations and hands-on exercises. After taking this course, students will be
able to plan, configure, and manage the RSA Archer environment.
The subject matter in this course prepares students with the classroom component
recommended for the RSA Archer Certified Administrator certification.
AudienceArcher administrators who are responsible for building and managing the
RSA Archer eGRC product.
Duration4 days
Prerequisite Knowledge/SkillsNone
Course ObjectivesUpon successful completion of this course, participants should be able to: Navigate within the RSA Archer system
Configure the look and feel of the RSA Archer interface
Create or edit an application
Import data
Set up email notifications
Create data-driven events and calculated fields
Manage user access
Automate work streams
Complete a questionnaire
Perform a data feed
Search and report on data
Set up a dashboard
Migrate changes between environments
Identify additional support resources
AT-A-GLANCE
This course provides an
overview to the concepts,
processes, and procedures
necessary to successfully
design and administer the
RSA Archer platform.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED ARCADMIN210 – Onsite Class
ED ARC TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
32/81
32© Copyright 2014 EMC Corporation. All rights reserved. 09/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Introduction to RSA Archer
▬ RSA Archer Overview
▬ Introduction to the case study
General Navigation
▬ Interface components
▬ Managing content records
Configure the Appearance
▬ Managing Themes
▬ Managing the Appearance
Centralize and Organize Data
▬ Data structure
▬ Application Builder overview
▬ Inside Manage Applications
▬ General Application Properties
▬ Field Management
▬ Page Layout
▬ Navigation Menu
Import Data
▬ Using the Data Import Manager
Alert Users to Data Changes
▬ Creating Letterheads
▬ Managing Subscription Notifications
▬ Troubleshooting Tips
Optimize the User Experience
▬ Data-Driven Events
▬ Calculated Fields
▬ Troubleshooting Tips
Manage User Access
▬ Access Control Basics
▬ User Accounts
▬ Access Roles
▬ Groups
▬ Record Permissions
▬ Private Fields
▬ Troubleshooting Tips
Automate Work Streams
▬ Configure a two-stage workflow
Questionnaires
▬ Question Library Overview
▬ Questionnaire Creation Process
▬ Completing a Questionnaire
Integration Options
▬ Data Feed Manager
Search and Report on Data
▬ Quick Search
▬ Advanced Search
▬ Statistics Search and Chart Options
▬ Reporting
Communicate Information to Stakeholders
▬ iViews
▬ Dashboards
▬ Workspaces
▬ Additional Configuration Options
Packaging for Production
▬ Creating Packages
▬ Installing Packages
▬ Advanced Package Mapper
Design Best Practices
▬ Field Design Tips
▬ Application Layout Tips
▬ Data-Driven Event Tips
Application Creation Case Study
▬ Hands-on exercise in which participants are
challenged to build a best-in-class application
with minimal assistance
Course Summary
▬ Customer Support Options
▬ Certification Exam Information
8/19/2019 h12172 Ds Rsa Education Services Catalog
33/81
33
RSA Archer® Advanced AdministrationCourse Description
OverviewThroughout the course, students will be presented with a diverse collection of real-
world governance, risk, and compliance problems and be shown and guided
through the recommended steps involved in solving these pain points by using the
features available in the RSA Archer eGRC Suite.
Extensive hands-on labs reinforce the tasks involved in designing and automating
GRC processes and extending the value of the RSA Archer eGRC Suite throughout
the organization. After completing this class, students will be prepared to use the
RSA Archer eGRC Suite to solve an extensive array of GRC problems and meet thebusiness requirements of various enterprise stakeholders.
AudienceGovernance, risk, and/or compliance professionals, business owners, or IT
personnel who need to automate and streamline existing processes, integrate the
RSA Archer platform with third-party systems, or deliver assessments across the
enterprise.
Duration4 days
Prerequisite Knowledge/SkillsPrevious experience creating applications within the RSA Archer product or
successful participation in the standard RSA Archer Administration course.
Course ObjectivesUpon successful completion of this course, participants should be able to:
Create a custom, multi-stage workflow process that automates a manual
process
Import existing information from a legacy system into RSA Archer applications
and questionnaires
Integrate the RSA Archer product with third-party systems and data sources to
consolidate enterprise information
Design best-practice assessment campaigns to measure compliance across the
organization
Construct complex search criteria to locate key information and identify data
trends
Visually showcase compliance with industry regulations through reports and
dashboards
Alert organization stakeholders through scheduled report distributions
Export RSA Archer data into pre-formatted, professional-looking report
templates
AT-A-GLANCE
This course provides hands-
on training on the
administration,
configuration and best-
practice deployment of the
RSA Archer Platform.
REGISTER FOR CLASSES:
For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
Training and Certification web
site:
www.emc.com/rsa-training
CONTACT US:
Email:
Phone: 800-995-5095
Int’l: 781-515-7700
Fax: 781- 515-6630
174 Middlesex Turnpike
Bedford, Massachusetts 01730
COURSE PART NUMBERS:
ED ARCADVADM210 – Onsite
Class
ED ARC TRAIN UNIT – Training
Units
8/19/2019 h12172 Ds Rsa Education Services Catalog
34/81
34© Copyright 2014 EMC Corporation. All rights reserved. 09/2014EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.
Course Outline
Streamlining GRC Processes — Day One
▬ Replicating a multi-stage workflow to
transfer a manual, paper-based process to
an automated, online tool
▬ Constructing a scalable access control
framework for enabling end users to
participate in GRC processes
▬ Automating and manipulating data through
calculations to support enhanced data
analytics and reduce data entry time
Integrating External Data — Day Two
▬ Transferring leveled, document-centric
policies into a data-centric format in the RSA
Archer Platform
▬ Using a data feed targeting database
sources to quickly transfer legacy data to a
centralized system
▬ Creating a data feed to access an RSS
source and retrieve the information into an
RSA Archer application
▬ Transferring data between RSA Archer
applications to support data trending and
reduce manual effort
Demonstrating Compliance – Day Three
▬ Importing compliance questions into RSA
Archer’s global question library
▬ Creating an assessment campaign to
demonstrate compliance with internal and
external regulations
▬ Managing question scoring and findings
generation to better understand the risk
impact to the organization
▬ Referencing existing assessment responses
in future assessments
Communicating GRC Data – Day Four, Part I
▬ Generating real-time reports across distant
data relationships to provide greater insights
into GRC processes
▬ Designing a user-friendly dashboard and
interface to clearly communicate the posture
of various business units
▬ Delivering snapshot reports on a set schedule
to inform key stakeholders of the current
status
▬ Exporting RSA Archer data to email and Word
templates to generate professional-looking,
document-based reports for senior
management
▬ Publishing RSA Archer data to external
databases
Maintaining the System – Day Four, Part II
▬ Discussing resources for the most current
installation and sizing recommendations
▬ Configuring instance settings via the Archer
Control Panel
▬ Accessing and reading log files
▬ Troubleshooting common RSA Archer issues
to ensure effective system operations
8/19/2019 h12172 Ds Rsa Education Services Catalog
35/81
35
RSA Archer® Solutions Overview Course Description
OverviewThis self-paced, interactive e-Learning course provides an introduction to the RSA
Archer Platform and its application to the management of Governance, Risk, and
Compliance in an organization. RSA Archer’s Solution modules are described and
use cases discussed for Out-of-the-Box applications.
AudienceRSA Customers
RSA PartnersRSA Internal Staff
DurationApproximately 20 minutes (e-Learning)
Prerequisite Knowledge/SkillsStudents should be familiar with basic principles of GRC (Governance, Risk, andCompliance).
Course ObjectivesUpon successful completion of this course, participants should be able to:
Understand Governance, Risk, and Compliance (GRC) and its organizational
impact. Describe the RSA Approach and its Business Value. Summarize RSA Archer Solution Areas. Reference and describe common RSA Archer Use Cases. Describe each RSA Archer Solution module and summarize key fe