Only a partial course catalog is displayed. Please log in to see the complete catalog.
Secret Server Courses (28):
Learn how to add and use SSH Key Dependencies in Secret Server
- Secret Server Overview which includes information on Secrets, Launchers, Session Monitoring, SSH Command Menus, and Discovery
- Configuration which includes information on Active Directory Authentication, Discovery, Secret Templates, Launchers, Remote Password Changers and Distributed Engine
- Troubleshooting for topics such as Secret Server, Launchers, Remote Password Changers and Distributed Engines
- Understand Secret Server's alerting options and SIEM integration
- Know how Secret Server can alert you about different kinds of actions taking place in the tool
- Know how to integrate your SIEM or log management tool within Secret Server to have better visibility of activity within the tool
This course for auditing and reporting and auditing/reporting troubleshooting will show you how to:
- Understand the Secret Server auditing and reporting capabilities
- Access a user and secret audit
- Access the reporting function and know which reports are the most useful to you
- Set up a schedule to provide reports to appropriate users
- Understand how to access an updated report
- Know how to customize the reporting screen
- Know how to access the Security Hardening and User Audit reports
- Understand how to access logs and what logs are available
- Know common techniques used to troubleshoot Secret Server's audit and reporting capabilities
- Understand how to use Secret Server's capabilities to automate management of service accounts
- Learn how to manage service accounts in your environment
- Know what dependencies are stored in the secret
- Learn how to add dependencies to secrets
- Know things to consider when managing secret dependencies
Learn about standard and
extensible discovery capabilities, including common techniques for
troubleshooting secret server discovery.
Learn about Secret Server session recording and monitoring capabilities, and common techniques used to troubleshoot recording.
In this course, you learn the best practices for securing your IBM Security Secret Server instance. Practices include: assigning roles, two-factor authentication, and securing encryption keys.
This lab gives an overview of the Secret Server user interface (UI).
No functionality is shown, lab just explores the important parts of the Secret Server user interface.
This video details the system requirements for Secret Server installations. Recommended system requirements are discussed for:
- Basic deployments
- Advanced deployments
You will also be provided with additional information on system requirements for servers used for Secret Server.
Time: 3 minutes
Secrets are individually named sets of sensitive information created from Secret templates.
In this series of videos, you will learn about troubleshooting key areas, such as templates, plugins, inactive Secrets, searching Secrets, and unlimited administration mode.
This video walks you through Secret Server's roles and permissions. Each Secret Server user must be assigned a role. Secret Server's method for regulating permission to system access is role-based security.
Time: 5 minutes
Learn about Secret Server disaster recovery and high availability.
Learn about Secret Server available API's
Setting up Active Directory is one of the first steps that should be
taken in the enterprise environment after IBM Security Secret Server
The presentation explains Active Directory
integration, why it is needed, requirements, and how to set it up.
This video provides three sections:
- Details on Active Directory integration
- Q and A
Secrets are individually named sets of sensitive information created from Secret templates. In this course, you will learn how to create and customize Secrets in IBM Security Secret Server.
In this course, you learn how to use and customize Secret Server's Dashboard, and also learn how to create and use Secret Server folders.
In this course, you learn about common methods used to troubleshoot basic configurations, such as troubleshooting Active Directory sync, integrated Windows authentication, and user access and permissions. You will also walk through using logs and diagnostics.
- Understand the purpose of the password changing feature
- Know how to enable and configure password changes
- Understand specific password changing steps necessary for certain platforms, such as web platforms
- Provide an overview of the Secret Server upgrade process
- Understand the necessary prerequisites for performing an upgrade
- Know what steps are involved when performing an upgrade
- Know hot to troubleshoot issues when performing an upgrade
Learn how to configure IBM Security Secret Server groups, roles, permissions, user management, user preferences, and Admin settings.
- Know the Secret Server installation prerequisites
- Learn where to download .NET framework 4.5.1 for installation
- Understand how to install Internet Information Services (IIS)
- Understand how to install SQL Server Express and know the recommended SQL versions
- Know the required steps for the Secret Server MSI installer
- Learn how to install a Secret Server license
- Learn how to determine who needs access, what permissions to apply and how to organize sensitive data using best practices in Secret Server
- Learn about the Secret Server's workflow features and what they do
- Understand the workflow capabilities, options and why features are used together
- Know how to create a one time password using the check out feature which forces accountability on secrets by granting exclusive access to a single user
- Set up the doublelock feature to secure your sensitive data
- Use the request for access feature to require that a user is granted approval to access a password or Secret for a specified amount of time
- Learn how to integrate your ticketing system with Secret Servder
this lab, you use the SSH Launcher that is configured on the Secret
Server to launch a privileged session on the Linux System.
Learn about Secret Server launcher capabilities and common techniques used to troubleshoot launchers.
Launchers provide direct access and authentication into remote machines.
In this lab you look at discovery in Secret Server. Discovery is the mechanism Secret Server uses to identify accounts and other secret-related objects on target systems (Active Directory, Unix systems and VMWare ESX servers). This lab explores the existing discovery configuration and create some accounts on targets and manually run the discovery.
- Learn how to integrate Privilege Manager with Secret Server
- Use Secret Server as Privilege Manager's storage container for credentials
- Understand how the REST API is used for communication with Privilege Manager from Secret Server