In this course, you learn about the IBM Verify Access access control mechanisms, Reverse Proxy junctions, authentication methods, as well as logging, auditing, and troubleshooting.
You gain skills around how to implement the variety of Verify Access Reverse Proxy junctions, including the configuration of authentication and authorization processes.
This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.
In this course, you learn about the following foundational capabilities:
Basic knowledge of security concepts and access controls principles.
- IT personnel
- Systems administrator
- IT security architect
- IT security deployment specialist
COURSE CONTENT: • Course introduction • Introduction to watsonx.data • Using the watsonx.data console • Data warehouse modernization • Incorporate operational data for analytics • Review and evaluation …
COURSE CONTENT: AIX Basics Training Course Course Contents – DAY 1 Course Introduction • Administration and Course Materials • Course Structure and Agenda • Delegate and Trainer Introductions Session…