ForgeRock® Autonomous Access Essentials

AX-100 Revision A

Description

Autonomous Access Essentials

 

Target Audiences

The following are the target audiences for this course:

  • ForgeRock Identity Cloud users who work with Autonomous Access:
    • Evaluators
    • Integrators
    • Consultants
    • Architects
    • Administrators

 

Objectives

Upon completion of this course, you should be able to:

  • Define the main features of Autonomous Access
  • Describe the Autonomous Access UI and user role capabilities
  • Explore how to integrate the Autonomous Access nodes into user journeys
  • Explain the Autonomous Access heuristics, the ML pipeline, and how to interpret the results

 

Prerequisites

The following are the prerequisites for successfully completing this course:

  • Knowledge of ForgeRock® Identity Cloud (Identity Cloud) essentials
  • Knowledge of online identity security principles
  • Awareness of cybersecurity threats
  • Awareness of ML

 

Duration

Approximately 2 hours

 

Course Contents

Welcome to ForgeRock® Autonomous Access Essentials

Course Introduction

Introducing Autonomous Access

Define the main features of Autonomous Access:

  • Describe Autonomous Access
  • Describe an Autonomous Access environment
  • Describe the business value and use cases of AI threat protection
  • Describe fraud explainable outcomes
  • Explain Autonomous Access threat prevention capability
  • Introduce fraud analysis with Autonomous Access
  • Demonstrate the impossible traveler attack method
Introducing the UI and User Roles

Describe the Autonomous Access UI and user role capabilities:

  • Introduce the Autonomous Access UI
  • Navigate the Autonomous Access UI
  • Explain the Autonomous Access user roles
  • Navigate the Fraud Analyst and Data Analyst UIs
  • Introduce the Risk dashboard
  • Set up the Risk dashboard filters
Introducing Integration With Identity Cloud

Explore how to integrate the Autonomous Access nodes into user journeys:

  • Autonomous Access nodes
  • Navigate the Autonomous Access nodes
  • Describe Autonomous Access journeys
  • Navigate the Autonomous Access Login journey
  • Describe Autonomous Access MFA journeys
  • Create an MFA journey and log in as the end user
Introducing Heuristics and the Training Models

Explain the Autonomous Access heuristics, the ML pipeline, and how to interpret the results:

  • Introduce Heuristics
  • Describe risk configuration
  • Demonstrate risk configuration
  • Describe the training pipeline
  • Run the Training Pipeline
  • Describe the training results
  • Analyze the training pipeline results

View On-Demand Courses

Train Your Team with ForgeRock Private Training

Request a Private Event