Courses and publications are offered to help you prepare for the certification tests. The courses are recommended, but not required, before taking a certification test. When preparing for the certification test, keep in mind that real world experience is required to stand a reasonable chance of passing the certification test. Courseware does not replace the requirement for experience. If you want to purchase Web-based training courses or are unable to locate a Web-based course or classroom course at the time and location you desire, please feel free to contact one of our delivery management teams at:
Please note that course offerings are continuously being added and updated. If you do not see the course(s) below listed in your geography please contact the delivery management team.
Study Guide for the certification test.
The IBM Security Network Intrusion Prevention System (IPS) is designed to stop Internet threats before they impact your business.
IBM Internet Security Systems - server protectiondelivers multilayered intrusion preven-tion and detection to help protect yourservers from growing methods of attackand more thoroughly manage compli-ance through extensive monitoring,recording and auditing capabilities.
IBM Proventia® Management SiteProtector™ system offers a flexible,one-stop security management systemto command and control a broad arrayof network security agents and devicesrequired to monitor and measure yourexposure to vulnerabilities and demon-strate regulatory compliance.
IBM Proventia Desktop Endpoint Security delivers comprehensive protection in a single product, from a single vendor.
IBM Security Virtual Server Protection for VMware® is an integrated threat mitigation solution designed to allow organizations to fully exploit the benefits of server virtualization while protecting critical virtualized assets.
IBM Proventia® Network Enterprise Scanner (Enterprise Scanner) is a proactive tool that accelerates timeto risk reduction by prioritizing vulnera-bility remediation tasks.
IBM Proventia® Network Multi-Function Security from IBM Internet Security Systems® (ISS) are powerful and affordable solutions that preemptively stop all types of Internet threats - including viruses, worms, hackers, spam and unwanted Web content - before they penetrate the network and disrupt business.
IBM Content Analysis Software Development Kit (SDK) has the most up-to-date filter database and accurate analysis–along with an easy-to-implement application programming interface (API).
IBM Security zSecure Admin provides security personnel with tools to help unleash the potential of your mainframe system–enabling efficient and effective RACF administration, while helping use fewer resources. By automating many recurring system administration functions and by enhancing the native RACF authorization and delegation capabilities, Security zSecure Admin can help you maximize IT resources, reduce errors, improve quality of services and demonstrate compliance.
IBM Security zSecure Audit is a mainframe tool designed to help security personnel of IBM Resource Access Control Facility (RACF®), CA ACF2 and CA Top Secret Security efficiently measure and verify the effectiveness of their mainframe security and security policies. Automatically generated reports in a standard format help to quickly locate problems with attributes around a particular resource (such as an unprotected data set). As a result, you can reduce errors and improve overall quality of service. Security zSecure Audit also helps expert users extend and enrich security by enforcing and enhancing security policies.
IBM Tivoli®Key Lifecycle Manager provides a simple solution to thecomplex problem of key management. Tivoli Key LifecycleManager can help you better manage the encryption key lifecycle, allowing you to simplify, centralize, and strengthenyour organization's key management processes and reduceoperational costs.
Tivoli Security Compliance Manager accomplishes on demand automation by moving from costly and tedious manual security server checking to automated security policy checking. As compliance assessments become automated, the time needed to manage security policies, compliance and security audits can decrease. Addi tional savings can also occur as potential security exposures across IBM AIX®, Solaris, HP-UX, Microsoft® Windows®, Linux and Linux on zSeries® are identified before a costly security breach can occur.
IBM Tivoli® Security Policy Manager offers a comprehensive data security solution for addressing these security challenges, providing a unified security policy management and runtime enforcement capabilities across applications, databases, containers (like Java™, .NET and portals) and intermediaries (like XML firewalls, Enterprise Service Bus and Web services gateways). Tivoli Security Policy Manager provides a single view into application roles, data entitlements and fine-grained policy enforcement across the application environment. It provides the central policy decision source to manage message protection and complex authorization policies.
IBM Tivoli Compliance Insight Manager provides visibility into your organization's security compliance posture through automated, enterprise-wide user activity monitoring. Includes dashboard views and reporting to help measure security posture and respond to auditors' requests.
IBM Tivoli®Federated Identity Manager helps you establish an identity trust management framework to know which users are con-necting to your services and what credentials are being used to connectto them without having to manage each of those individual users.Tivoli Federated Identity Manager will validate and propagate therequired credentials end to end, from a point-of-contact server throughan enterprise service bus (ESB) to the back-end mainframe. The soft-ware provides concurrent support for leading federated SSO protocols,including Security Assertion Markup Language (SAML) 1.0/1.1/2.0,OpenID, Information Card Profile, Liberty Identity FederationFramework (ID-FF) 1.1/1.2 and Web Services (WS)-Federation,enabling users to connect to multiple, heterogeneous business sites,while helping to preserve the confidentiality of user data.
IBM Tivoli Security Operations Manager automates many repetitive, time-intensive activities required for effective security operations. The result is an efficient, cost-effective approach to security operations.
IBMTivoli Directory Integrator offerssmall and large organizations a cost-effective way to synchronize heteroge-neous identity and generic data sourcesand build an automated, authoritativedata infrastructure. By enabling you tomaintain consistent and trusted dataacross multiple identity or genericresources, Tivoli Directory Integratorcan help you leverage emerging, on-demand business models.
IBM Tivoli® Directory Server helps companies meet today's IT challenges by providing a high-performance Lightweight Directory Access Protocol (LDAP) identity infrastructure.
Tivoli Access Manager for Operating Systems includes a GUI-based, Web-accessible management tool. This tool lets you manage security policy in a point-and-click format. Command line interfaces, script accommodation and APIs for C and Java™ provide UNIX and Linux experts with tools they can use to streamline and automate various management tasks.
IBM Tivoli® Access Manager for e-business provides a centralized approach to authenticating and authorizing user access to Web and other applications that you host and helps address the key Web security and compliance needs.
IBM Tivoli Access Manager for Enterprise Single Sign-On helps organizationsreduce costs, strengthen security,improve productivity and address com-pliance requirements.
IBM Tivoli®Identity Manager addresses these challenges by providing an easy-to-deploy, user-friendly solution that delivers security-rich, policy-based user and role management across the ITinfrastructure.
Designed to ensure endpoint security across the organization, Tivoli Endpoint Manager for Security and Compliance can help your organization both protect endpoints and assure regulators that you are meeting security compliance standards. It delivers an easy-to-manage, quick-to-deploy solution that supports security in an environment that is likely to include a large variety and large numbers of endpoints– from servers to desktop PCs, "roaming" Internet-connected laptops, and specialized equipment such as point-of-sale (POS) devices, ATMs and self-service kiosks.