CA Access Control enables host level security, locking down OS resources and akin to mainframe security. Granular rules control logins and access to critical resources. Privileged accounts are securely shared. UNIX system authentication is consolidated. Centrally managed policy enables enterprise wide, cross-platform
consistency. And detailed, secure auditing tracks system access, resource utilization, and security impact.
This course teaches students about the capabilities, benefits, and features or CA Access Control as well as the components and data flow of the deployed enterprise architecture.
What You Will Learn
- Solve business challenges using CA Access Control
- Apply key capabilities to technical issues
- Understand enterprise deployment architecture
This course teaches your team the benefits and capabilities of CA Access Control. Technicians will learn what they can achieve with granular controls and centralized policy management. Students will also learn what a basic enterprise scale architecture looks like.
WHO SHOULD ATTEND
- Security Administrator
- Security Architect
- Implementation Consultant
- IT Architect
|Module 1 – Introduction||Module 2 – Architecture|