What You’ll Learn
Describe Privileged Identity Management
Explain the benefits and business value of the IBM Privileged Identity Management solution
Describe the components of the IBM Privileged Identity Management solution
Install and configure the Privileged Identity Manager virtual appliance
Create and administer privileged administrators and users
Use the PIM consoles to create and manage credentials, credential pools, resources, identity providers and shared access policies
Manually check out and check in credentials
Use automatic credential check-out andCHECK-IN
Use and configure Privileged Session Recording
Describe, configure, and manage application identities
Use and configure the Cognos-based Privileged Identity Manager reports
Manage and monitor the PIM appliance with the virtual appliance dashboard
Customize PIM to implement typical usage scenarios
Who Needs to Attend
Privileged Identity Manager administrators
Privileged Identity Manager users
Privileged Identity Manager auditors
You should make sure that you have the following skills:

Basic Windows Administration skills
Follow-On Courses
There are no follow-ons for this course.

Course Outline
Unit 1: Introduction to IBM Security Privileged Identity Manager
Unit 2: Planning and installation
Unit 3: PIM concepts
Unit 4: Shared account administration and usage
Unit 5: Privileged session recorder
Unit 6: Application identity management
Unit 7: Reporting
Unit 8: PIM virtual appliance management
Unit 9: Customization and advanced topics

  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
Create an Account