Call : (+91) 968636 4243
Mail :

CA Identity Governance

( Duration: 2 Days )

This CA Identity Governance training course provides skills to establish a clean set of user entitlement data to support risk and compliance efforts, prevent security vulnerabilities through consistent identity governance policy enforcement, and increase compliance efficiency by streamlining certification processes.

By attending CA Identity Governance workshop, delegates will learn to:

  • Identify the key features and benefits of CA Identity Governance.
  • Import and export configuration data between CA Identity Governance and native systems.
  • Clean up and enrich the configuration data for role discovery and modeling.
  • Discover potential roles by efficiently analyzing extremely large volumes of user and privilege information.
  • Establish and enforce a consistent set of business and regulatory compliance policies.
  • Run certification campaigns to periodically validate that users have appropriate access to corporate resources.
  • Monitor the CA Identity Governance environment using dashboards and reports.

  • Basic knowledge of CA Identity Governance

The CA Identity Governance class is ideal for:

  • System Administrators
  • Security Administrators
  • Application Administrators
  • IT Security Analysts
  • IT Security Auditors
  • IT Architects
  • Technical Support Analysts



CA Identity Governance Overview

  • Identify the challenges in identity governance and compliance
  • Identify the key features and benefits of CA Identity Governance

CA Identity Governance Key Concepts and Components

  • Identify the key concepts in CA Identity Governance
  • Identify the CA Identity Governance interface components

Import and Export Configuration Data

  • Identify the import data file formats
  • Import and export configuration data
  • Merge and enrich configuration data
  • Import data in batch

Manage Configuration Data

  • Conduct a visual‐based cleanup of the configuration data
  • Perform pattern‐based audits
  • Resolve the unique user ID challenge

Perform Role Modeling

  • Describe the role engineering process
  • Discover role candidates
  • Create roles manually

Check Policy Compliance

  • Enforce policy compliance using business process rules
  • Perform compliance verification
  • Run compliance reports

Run Certification Campaigns

  • Run a certification campaign to verify that privileges comply with business and regulatory requirements

Manage Roles with Self‐service

  • Control role and resource assignments for yourself and your team
  • Request a new or changed role definition

Monitor the CA Identity Governance Environment

  • Identify the reporting features of CA Identity Governance
  • Identify the types of dashboards in CA Identity Governance

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.