Kursangebot
- Upcoming Events
- Garantietermine
- Neue Kurse
- iTLS Academy»
-
iTLS IT Workshops»
- IT-Training by iTLS
- Garantietermine
- Themen im Fokus
- Professional Services
- Hersteller im Fokus
- Amazon Web Services»
- Aruba»
- Barracuda
- Check Point
- Cisco»
- Ethical Hacking
- F5 Networks
- Fortinet»
- Google Cloud»
- ITIL® und Cobit
- Microsoft»
- NetApp»
- Palo Alto Networks»
- VMware»
- Weitere Hersteller»
- Themen/Technologien im Fokus
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Kubernetes / Container»
- Linux»
- Network Analysis / Wireshark»
- Projektmanagement
- Python»
- Software Development»
- Wireless & Mobility»
OR-D66036
Online Training
Dauer 5 Tage
Preis (exkl. MwSt.)
-
Country: AT3.785,- €
Derzeit gibt es keine Online-Termine für diesen Kurs.
Classroom Training
Dauer 5 Tage
Preis (exkl. MwSt.)
-
Österreich:
Country: AT4.270,- €
-
Schweiz:
Country: CH4.270,- €
Derzeit gibt es keine Klassenraum-Termine für diesen Kurs.
Termin anfragenOracle Adaptive Access Manager 11g: Administration (D66036)
Detaillierter Kursinhalt
Overview
- Define four types of Internet attacks
- Propose four solutions for Internet attacks
- List the benefits of Oracle Adaptive Access Manager (OAAM)
- Describe the role of Oracle Adaptive Access Manager
- Explain how OAAM works
- List the new features in OAAM 11gR2 PS3
- Describe the High-level Architectural and Deployment Topology
- Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
- Describe Prerequisites
- List the key steps to install and configure OAAM
- Post-install and Configure validation steps
- Start and stop the OAAM 11g environment
OAAM Customizations
- List the different types of OAAM customizations
- Perform key customizations: Custom CSS
- Perform key customizations: Header and Footer
- Perform key customizations: Custom Virtual Authentication Devices (VAD)
- Perform key customizations: User action and flows
- Perform key customizations: Custom layout
- Describe the key configuration files used in customizations
Policies – Static, Patterns, and Predictive
- Distinguish and describe three types of risk analyses
- Create Static Policies
- Create the artifacts – Checkpoint, Rules, Conditions, Alerts, and Actions Groups
- What is a pattern?
- In a pattern, what data is captured and when?
- In a pattern, where is data stored and how is data used?
- How to use predictive analysis
- Provide OAAM predictive analysis use cases
Custom Application Integration
- Integrate OAAM natively with a custom application using In-Proc mode integration
- Integrate OAAM natively with a custom application using SOAP mode integration
- Use sample application to perform a code walk through on Java APIs implementation
Transactions
- Understand Entities, Data Elements and Transaction data
- Defining and Using Transaction Definition
- Mapping Entities to the Source Data
- Mapping Transaction Data to the Source Data
- Performing Transaction Fraud Analysis
Reporting and Auditing
- Install and configure BI Publisher Reports
- View out-of-the-box reports
- Setup Configuration
- Creating Custom Reports
- Learn OAAM audit framework
- Understand Audit Events, Reports, and Data
- Use BI Publisher to run Audit Reports
Monitoring and Diagnostics
- Identify tips on troubleshooting OAAM 11g R2 PS3 environment
- Monitor the key metrics by using FMW EM Control
- View and configure logging
- Use the OAAM Dashboard
OAAM Offline and Job Scheduler
- Explain Job Types
- Explain how to Schedule Jobs
- Describe Job Management
- Explain the OAAM Offline Server Use Cases
OAAM – OAM Integration
- List different types of integration options
- Explain OAM-OAAM TAP integration use case
- Explain risk-based challenge by using KBA
- Explain step-up authentication by using OTP
Customer Service Representative and Agent Fraud Cases
- Understand Customer Service Representative Cases
- Understand Agent Cases for Fraud
- Perform Profile Resets for OTP
- Unblock users who fail OTP Challenges