PingAccess Course Content

This Ping Access Certification course has been designed in such a way as to match current job requirements & to cover all the access management concepts from scratch. We can also help individuals and corporations with customized project-specific training plans. Following are the standard Ping Access training modules:

Topics:

  • Fundamentals of Access Management
  • PingAccess Platform Overview
  • Ping Access Components
  • Ping Access Use Cases

Topics:

  • Web Application Protection
  • Extended API Security
  • Agent Deployment
  • Ping Access For Azure AD

Topics:

  • System Requirements for PingAccess Installation
  • Starting PingAccess
  • Administrative Console
  • PingAccess administrative API
  • Changes to configurations 
  • Changes to database passwords
  • Stopping PingAccess

Topics:

  • PingAccess Linux Service Management 
  • PingAccess Windows Service Management

Topics:

  • Session Management Configuration
  • Server-side Session Management Configuration
  • PingAccess Customization 
  • Log configuration

Topics:

  • Fundamentals of Access Management
  • PingAccess Platform Overview
  • Ping Access Components
  • Ping Access Use Cases

Topics:

  • Web Application Protection
  • Extended API Security
  • Agent Deployment
  • Ping Access For Azure AD

Topics:

  • System Requirements for PingAccess Installation
  • Starting PingAccess
  • Administrative Console
  • PingAccess administrative API
  • Changes to configurations 
  • Changes to database passwords
  • Stopping PingAccess

Topics:

  • PingAccess Linux Service Management 
  • PingAccess Windows Service Management

Topics:

  • Session Management Configuration
  • Server-side Session Management Configuration
  • PingAccess Customization 
  • Log configuration

Topics:

  • PingAccess Agent Fundamentals
  • Agent for Apache
  • Agent for Apache (Windows)
  • Agent for IIS
  • Agent for NGINX
  • Agent protocol
  • Agent SDK for C
  • Agent SDK for Java

Topics:

  • Device Risk Integration
  • API Gateway Integration
  • PingOne Protect Integration

Topics:

  • PingFederate Token Configuration with PingAccess
  • Connection Creation Between PingAccess & PingFederate

Topics:

  • Monitoring & Troubleshooting

Topics:

  • Backing up and restoring PingAccess
  • Backing up and restoring Methods
  • Upgrading PingAccess
  • Upgradation Types & Methods

Looking for a detailed curriculum? Enquire now!

Get the full course details to your inbox!

LIVE SESSIONS


  • Real-time Trainers
  • Live interactive Sessions
  • Cloud Labs

CORPORATE TRAINING


  • Customized Training Solutions
  • Blended Delivery Model
  • Project Implementation Support

SELF-PACED LEARNING


  • High-Quality Videos
  • Access to Materials
  • Permanent Access

Ping Access Course Objectives

Our Ping Access certification course is designed to match the real-time project requirements, and candidates will gain practical experience in the following areas by the time they finish the course:

  • Understand the Fundamentals of Access Management
  • Navigate Through the Ping Access Platform UI
  • Explore Ping Access Features
  • Work on Ping Access Installation & Configurations
  • Implement Deployment Models
  • Work with Ping Access Agents
  • Learn Identity Mapping
  • Understand Token Mediation
  • Implement API Access Controls
  • Explore Web Applications Access Security
  • Work on Administration Tuning
  • Perform Clustering
  • Work on Measures to Improve Performance
  • Monitoring & Backup
  • Best Practices to Implement PingAccess

The participants who wish to enroll in this Pingaccess course should be familiar with Ping Identity or any other identity and access management tools.

This Ping Access course is ideal for the following professionals:

  • PingFederate Administrators
  • IT Administrators
  • Identity professionals
  • Cybersecurity professionals

Ping Access is a centralized access management solution from Pingfederate that extends security for web applications and APIs. Its centralized policy engine facilitates highly secured access to web applications and APIs for only authorized users.

PingAccess can not perform operations independently; it works in association with Pingfederate or any other token provider to enforce identity-based access management policies using a federated identity store. 

All-access requests are routed through the PingAccess gateway or agent, and these components coordinate with policy decisions the policy server makes. Ping Access decides whether to accept or deny a request based on policy.

 

PingAccess Certification

Once you finish your PingAccess training course, Techsolidiy will send you an electronic course completion certificate. You can share this certificate with employers on social media to demonstrate your Ping Identity & Access Management skills.

techsolidity-certification

PingAccess Projects

We have designed this training to deliver a practical learning experience. This PingAccess training is aligned with some projects and uses cases to provide hands-on knowledge.

Ping Access Training Reviews

PingAccess FAQ's

Yes, Techsolidty offers you two types of Discounts: one is group discount and the other is referral discount.
Yes, In order to provide you the financial flexibility, we provide you the chance to pay the course fee in two installments.
Due to any reasons, you would like to cancel your registration after paying the fee, you should intimate the same to us within the first two classes. The refund amount will be processed within 30 days from the requested date.
To meet the customer expectations we provide multiple types of training which include, Live instructor-led training, Self-paced training, blended training, classroom training, corporate training, etc.
Yes, at Techsolidity all the training courses consist of a minimum of two projects to offer the candidates real-time work understanding!