+1800 419 8722
+1-307-387-5278
Courses

Course Package

Exam Voucher by SailPoint

Official Training Material from SailPoint

Official SailPoint E-Book

Highly Experienced & Accredited Instructor

Live Instructor-Led Sessions

Real Life Examples & Case Studies

 

Target Audience for SailPoint Identity IQ Engineer Training

 

Anyone interested to start career in I&AM 

  • IT Managers 

  • Cloud Engineers 

  • IT Engineers 

  • Software Developers 

  • Network Engineers 

 

Pre-requisites of SailPoint Identity IQ Engineer  Certification Training 

 

  • A basic understanding of JAVA programming language. 

  • A basic understanding of IT Security and Information Security. 

  • Basic knowledge of computer systems with IAM is recommended. 

  • Additional knowledge of active directory and cloud computing is a plus.

In this course you will get access to hands on labs and exercises. 

 

SailPoint Identity IQ Engineer Certification Journey 

Course Outline

Day 1
  • 1) IAM Overview -> SailPoint Products 
  • 2) SailPoint Product Installation and Patching  

 

Day 1- Administration 

3) IdentityIQ Preview  

  • Compliance Manager 
  • Lifecycle Manager 
  • SailPoint Modules and Artefacts 

4) Introduction to SailPoint Virtual Machine + Exercises Environment ++ Deployment ++ Migration 

5) SailPoint Monitoring Piece and Important Configuration Files - Administration 

  • Extended Attributes 
  • IIQ Properties 
  • Log4j 
  • Audit Configuration 
  • SysLog  
  • Email Configuration  

 

Module 1 -> Application Onboarding Development and Administration 

Day 2 & 3 

6) Application onboarding - Authoritative Application and Non-Authoritative Applications Connectors 

  • Delimited Single Object, Multiple Object 
  • JDBC Applications-Mysql database 
  • LDAP 
  • Special case Connectors 
  • Multiplex and Logical Application 
  • Best Practices and Aggregation Strategies 
  • Manual Correlation 
  • Important Tasks and Custom Schedules  
Module 2 – Compliance – Policy + Risk + Certifications and RBAC Day 2 and 3

7) Implementing Risk in IIQ 

  • Identity level Risk 
  • Application Level Risk 
  • Targeted Monitoring 
  • Reporting - Admninstration 

 

8) Policies In IIQ 

8.1 > Policies in Compliance and Policies in Provisioning 

  • SOD Policies - Role Level and Entitlement Level 
  • Activity Policy 
  • Account Policy 
  • Risk Policy 
  • Advanced Policy 

 

8.2 >Handling Policy Violations and Policy Reporting 

Day 4 

9) Certifications in IIQ 

Identity and Event-Based Certifications 

  • Manager certification 
  • Entitlement Owner 
  • Application Owner 
  • Advanced Certification 
  • Membership Certification 
  • Composition Certification 

Event Based Certification 

  • Joiner 
  • Mover  
  • Leaver 
  • Dynamic Reports and OOTB Reports on Certifications 

Day 4 

10) Roles in IIQ 

Role Based Access Control 

Role Modelling and Mining Activities 

  • Business Role Mining 
  • IT Role Mining 
  • Entitlement Analysis 
Module 3 – LCM, Workflow and Provisioning -Development and Administration

11) Rules, Tasks and API -> Best Practices and Admninstration 

12) Lifecycle Manager and Components 

13) Access Requests - Administration 

14) Lifecycle Events and Custom Workflow 

  • Custom Workflow Development mapped to Lifecycle Event

 

8) Policies In IIQ 

8.1 > Policies in Compliance and Policies in Provisioning 

• SOD Policies - Role Level and Entitlement Level 

• Activity Policy 

• Account Policy 

• Risk Policy 

• Advanced Policy 

 

8.2 >Handling Policy Violations and Policy Reporting 

 

Day 4 

9) Certifications in IIQ 

Identity and Event-Based Certifications 

• Manager certification 

• Entitlement Owner 

• Application Owner 

• Advanced Certification 

• Membership Certification 

• Composition Certification 

Event Based Certification 

• Joiner 

• Mover  

• Leaver 

• Dynamic Reports and OOTB Reports on Certifications 

 

Day 4 

10) Roles in IIQ 

Role Based Access Control 

Role Modelling and Mining Activities 

• Business Role Mining 

• IT Role Mining 

• Entitlement Analysis 

Why Knowlathon

Brain icon
Established Expertise
Since 2013, Knowlathon has been offering high-quality training programs.
Brain icon
Client-Centric Approach
By prioritizing the unique needs and goals of each client, we deliver training solutions that drive tangible results.
Brain icon
Global Reach
Knowlathon has established itself as a trusted partner in IT training, helping individuals and businesses achieve their goals on a global scale.
Brain icon
Experienced Professionals
With deep industry knowledge and extensive expertise, our trainers bring real-world insights and practical skills to their courses.
Brain icon
Quality Commitment
We ensure that all training materials and methodologies meet industry benchmarks for excellence.
Brain icon
Strong Support
Our dedicated support team ensures a seamless and enriching learning experience.
Brain icon
K-Prime Warranty *
We are the 1st & only learning company to offer unlimited learning warranty on our courses.

Student feedback

4.8
Course Rating
70%
15%
20%
3%
2%

Write a Review

What is the experience of taking a course like?