Detailed Course Outline
Unit 1: Introduction to IBM Identity Governance and IntelligenceUnit 2: Deployment planning considerationsUnit 3: Managing the exchange of dataUnit 4: Role lifecycle managementUnit 5: Access risk control modelingUnit 6: Certification campaignsUnit 7: Workflow processesUnit 8: Reporting