In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions.
You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine. First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you are setting up the Reverse Proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions.
This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.
Architecture and deployment
User, group, and domain configuration
Reverse proxy concepts
Managing access control
Reverse Proxy junctions
Authentication framework and methods
Logging, auditing, and troubleshooting
In this course, you learn to do the following tasks:
null
IT Personnel, System Administrator, IT Security Architect, IT Security Deployment Specialist
COURSE CONTENT: Day 1 Course Introduction Junos Layer 2 Packet Handling and Security Features •Transparent Mode Security •Secure Wire •Layer 2 Next Generation Ethernet Switching •MACsec LAB 1: Implementing…
COURSE CONTENT: DAY 1 Course Introduction Juniper Connected Security • Identify the high-level security challenges in today’s network • Describe basic network security design • Identify the key factors…
COURSE CONTENT: CCSE – Topics: •Management Maintenance •Management Migration •Management •High Availability •Policy Automation •Gateway Maintenance •The Firewall Kernel •User-Mode Processes •ClusterXL •Traffic Acceleration •Core Acceleration •Interface Acceleration •Threat…
We use cookies to improve your experience, including essential cookies required for the website to function. By continuing, you agree to our use of cookies. Learn more.