{"id":3975,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-ibm-security-verify-access-foundations\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-ibm-security-verify-access-foundations","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-ibm-security-verify-access-foundations\/","title":{"rendered":"IBM Security Verify Access Foundations"},"content":{"rendered":"
[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n
IBM Security Verify Access helps you simplify your users’ access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization’s migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nDescribe IBM Security Verify Access product and its key features
\nDiscuss the architecture and deployment process
\nConfigure IBM Security Verify Access users, groups, and domains
\nIntroduce concepts of a reverse proxy and how it fits in your web-based infrastructure
\nDescribe protected object space and the policy access control model
\nExplain how to set up reverse proxy junctions to handle web requests
\nDiscuss and configure authentication mechanisms that are supported by Verify Access
\nExplain and set up logging, auditing, and tracing for Verify Access components
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n
Ciberseguridad<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato e-learning<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato presencial<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato a distancia<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n