Saviynt Course Content

Security identity management experts designed this course to cover fundamentals to advanced components. This program is deeply aligned with job market requirements and makes the participants skilled in creating enterprise-grade access management solutions using the Saviynt platform.

Topics:

  • Role of Identity and Access Management (IAM)
  • Identity Governance Administration (IGA)
  • Saviynt Comparison with other tools 

Topics:

  • Overview of Saviynt installation steps
  • Installation & Configuration of MySQL, Tomcat and JDK 
  • Saviynt Deployment
  • Working on Errors
  • Saviynt Console

Topics:

  • Importing User Records
  • Email Generator Configuration
  • Username Generator Configuration

Topics:

  • AD Accessing
  • Connector Architecture, Capabilities, Supported Data Files, etc.
  • Connector Configuration
  • Testing & Validating Connectors
  • Log-in’s Configuration

Topics:

  • Rapid Application Onboarding
  • Assisted Application Onboarding
  • Advanced Application Onboarding

Topics:

  • Role of Identity and Access Management (IAM)
  • Identity Governance Administration (IGA)
  • Saviynt Comparison with other tools 

Topics:

  • Overview of Saviynt installation steps
  • Installation & Configuration of MySQL, Tomcat and JDK 
  • Saviynt Deployment
  • Working on Errors
  • Saviynt Console

Topics:

  • Importing User Records
  • Email Generator Configuration
  • Username Generator Configuration

Topics:

  • AD Accessing
  • Connector Architecture, Capabilities, Supported Data Files, etc.
  • Connector Configuration
  • Testing & Validating Connectors
  • Log-in’s Configuration

Topics:

  • Rapid Application Onboarding
  • Assisted Application Onboarding
  • Advanced Application Onboarding

Topics:

  • Provisioning
  • Security System
  • End Point
  • Reconciliation

Topics:

  • Access Request System
  • Access Request System Types
  • Role Access Request

Topics:

  •  Risk-Based Attributes
  • SOX Criticality,
  • Financial Access Risk. 
  • System Criticality
  • Privileged Access Risk
  • Entitlement Data

Topics:

  • Birthright Roles
  • Application-based Roles
  • Business-based Roles
  • Dynamic Roles

Topics:

  • Application Workflow Hierarchy
  • Request Form Creation
  • Request Creation
  • Security Workflows

Topics:

  • Delegation Configuration
  • Email Templates

Topics:

  • Risk Creation
  • Risk Configuration
  • SOD Evaluation
  • Saviynt Mitigation Controls

Topics:

  • Certification Creation
  • Certification Reports

Topics:

  • Saviynt Analytics
  • Analytics Configurations
  • Use Cases

Looking for a detailed curriculum? Enquire now!

Get the full course details to your inbox!

LIVE SESSIONS


  • Real-time Trainers
  • Live interactive Sessions
  • Cloud Labs

CORPORATE TRAINING


  • Customized Training Solutions
  • Blended Delivery Model
  • Project Implementation Support

SELF-PACED LEARNING


  • High-Quality Videos
  • Access to Materials
  • Permanent Access

Saviynt Course Objectives

  • Fundamentals of Saviynt platform
  • Gain deep insights about Saviynt’s EIC Microservices-based architecture
  • Overview & Features of IAM & IGA
  • Saviynt’s Enterprise Identity Cloud (EIC)
  • Application onboarding Steps
  • User data importing processes
  • Saviynt (SAV) Roles, Customization, roles assignment
  • Identity Lifecycle Management events
  • Technical Rules Configuration
  • Access Request System Configuration
  • Dynamic attributes configuration
  • Understand how to manage and configure Approval Logic.
  • SOD features offered by Saviynt.
  • SOD capabilities: Preventive & detective
  • Saviynt Reports & Analytics
  • Saviynt Certification Dumps & Interview Preparation

The participants who wish to enroll in this course need no pre-qualified skills. Knowing identity & access management concepts would be beneficial.

This Saviynt program suits Frehsers, IAM Engineers, PAM Engineers, IT Administrators, Security experts, etc.

Saviynt is a leading cloud-first identity governance platform with cutting-edge features to secure apps, data, and infrastructure from identity data breaches. Saviynt combines IAM features with Identity Governance Administration (IGA) to intelligently manage access management & data privacy and security. 

Saviynt IGA is associated with hundreds of control exchangers and industry-standard providers to make identity management more seamless. It offers connectors with widely used cloud providers and applications. This makes the application on-onboarding process seamless & standardizes the source of Identity. Saviynt IGA has 200 built-in controls to track usage and simplify compliance documentation.

Saviynt Certification

This program covers end-to-end aspects of the Saviynt platform and provides you with the skills and materials required to pass the Saviynt Certified IGA Professional (SAVIGA-C01) exam. Apart from the official certification guidance, you will receive a Saviynt course completion certificate from Techsolidity.

techsolidity-certification

Saviynt Projects

Our Saviynt training is more of a practical-oriented program, and from day one, you will be working on assignments and lab sessions & get a chance to explore every Saviynt component. By the end of this Saviynt certification course, you will gain complete knowledge to work on enterprise-grade Identity & access management projects.

Saviynt Training Reviews

Saviynt FAQ's

Yes, Techsolidty offers you two types of Discounts: one is group discount and the other is referral discount.
Yes, In order to provide you the financial flexibility, we provide you the chance to pay the course fee in two installments.
Due to any reasons, you would like to cancel your registration after paying the fee, you should intimate the same to us within the first two classes. The refund amount will be processed within 30 days from the requested date.
To meet the customer expectations we provide multiple types of training which include, Live instructor-led training, Self-paced training, blended training, classroom training, corporate training, etc.
Yes, at Techsolidity all the training courses consist of a minimum of two projects to offer the candidates real-time work understanding!