GRC Course OverviewTraining Hours: 60 – 80

Unit 1: Getting Started with Access Control
  • Lesson: Discussing Business Challenges and Solutions
  • Lesson: Using Access Control
    • Connect to the System and Navigate the User Interface
Unit 2: Managing Compliance with Access Control
  • Lesson: Identifying Authorization Risks
  • Lesson: Managing Risk by Segregating Duties
Unit 3: System Architecture
  • Lesson: Describing the System Architecture
Unit 4: Security and Authorizations
  • Lesson: Describing Security and Authorizations
Unit 5: Shared Configuration Settings
  • Lesson: Configuring Shared GRC Settings
  • Lesson: Configuring Shared Access Control Settings
Unit 6: Synchronizing with the Access Control Repository
  • Lesson: Synchronizing Objects into the Repository
  • Lesson: Scheduling and Viewing Background Jobs
Unit 7: Analyze and Manage Risk
  • Lesson: Maintaining Shared Master Data
    • Maintain Owners for Risk and Mitigating Controls
  • Lesson: Configuring and Maintaining the Rule Set
    • Review Configuration for Analyze and Manage Risk Functionality
    • Maintain a Rule Set
    • Maintain Functions
    • Maintain a Risk
    • Maintain a Critical Access Rule
    • Perform Ad Hoc Risk Analysis
  • Lesson: Using and Configuring Audit Trail Tracking
    • View the Audit Log
  • Lesson: Using the Risk Analysis Framework
    • Perform a Role Level Simulation
    • Perform a User Level Simulation
  • Lesson: Remediating Risks
  • Lesson: Mitigating Risks
    • Create a Mitigating Control and Assign a User and Role
  • Lesson: Mass Mitigating
Unit 8: Emergency Access Management
  • Lesson: Managing Emergency Access
    • Review Emergency Access Management Configuration
  • Lesson: Planning for Emergency Access
    • Maintain Owners and Controllers in Central Owner Maintenance
    • Assign Owners to Firefighter IDs
    • Assign Controllers to Firefighter IDs
    • Assign Firefighter Users to Firefighter IDs
    • Maintain Reason Codes
    • Execute a Firefight Session
  • Lesson: Monitoring Emergency Access
    • Review a Log Report

Unit 9: Business Rules Framework

  • Lesson: Creating Rules in the Business Rule Framework (BRF)
  • Lesson: Defining Business Rules
    • Create Initiator Rule
    • Create Agent Rule
    • Create Routing Rule
Unit 10: Maintaining MSMP Workflow
  • Lesson: Describing Multi-Stage Multi-Path (MSMP) Workflow
  • Lesson: Maintaining MSMP Workflow: Part One
  • Lesson: Maintaining MSMP Workflow: Part Two
Unit 11: Provision and Manage Users
  • Lesson: Designing End User Personalization Forms
    • Maintain End User Personalization Forms (Access Request Templates)
  • Lesson: Planning for User Access
    • Create an Access Request
    • Create an Access Request with a Model User
    • Create an Access Request with a Template
    • Create an Access Request from a Copy
  • Lesson: Defining User Provisioning
    • Configure Settings Specific to Provisioning and Managing Users
  • Lesson: Requesting User Access Approval
    • Set Workflow Administrator and Security Lead Owners
    • Respond to Access Requests
    • Review the Audit Log
Unit 12: Design and Manage Roles
  • Lesson: Configuring Role Management
    • Review Design and Manage Roles-Specific Configuration Options
  • Lesson: Configuring Role Methodology
    • Review Configuration Settings for Condition Groups
    • Associate Role Methodology Process to Condition Group
    • Maintain Owners for Role Management in the Setup Work Center
    • Maintain Default Owners with Condition Group
  • Lesson: Planning for Technical Role Definition
    • Create a Single Role
    • Create a Composite Role
  • Lesson: Planning for Business Role Definition
    • Create a Business Role
  • Lesson: Consolidating Roles through Role Mining
  • Lesson: Mass Managing Roles
Unit 13: Periodic Access Review Process
  • Lesson: Planning Periodic Review
  • Lesson: Monitoring Periodic Review
Unit 14: Reporting
  • Lesson: Working with the Reporting Framework
    • Change an Existing Report
    • Add Custom Fields to Request Header
    • Add Custom Fields to Role Definition
Unit 15: Implementing Access Control
  • Lesson: Working with the Access Control Implementation Process
  • Lesson: Designing the Access Control Solution
  • Lesson: Planning Upgrade and Migration
  • Lesson: Configuring Access Control
  • Lesson: Implementing the Solution
  • Lesson: Optimizing and Enhancing the Solution