Advanced Security: Protect the Modern Perimeter with Okta

Use Okta to create a Zero Trust environment in a landscape where people are the new perimeter.

rate limit

Code not recognized.

About this course

The distributed nature of today’s workforce combined with the volume of in-cloud and on-premise IT resources requires a modern, identity-centric approach to securing your organization's assets and protecting the perimeter.

Using Okta’s Policy Framework, you will gain experience configuring zone-based multifactor enrollment (MFA) policies to govern user and application access. This course explores Okta ThreatInsight’s ability to identify people and device access patterns associated with threat actors or malicious traffic. You’ll use Okta’s contextual response framework to leverage this data to implement effective passwordless authentication policies. Automations and managing log data will strengthen your security posture.  Finally, you learn about meeting compliance standards with Okta.

By attending this course, you will gain the skills to:

  • Enhance your company’s security posture using a rich set of Okta tools.
  • Identify Okta Adaptive MFA capabilities and integration scenarios.
  • Decide the best factors and security policies for distinct business scenarios.
  • Configure MFA enrollment and enforcement policies.
  • Implement MFA using Network Zones and contextual data.
  • Set up Behavior Detection to identify security threats based on login patterns, device context, and location.
  • Configure passwordless authentication.
  • Set up management attestation for desktop devices through Okta's Security Device Integrations.
  • Simplify user lifecycle activity using Okta Workflows and Automations.
  • Detect possible security risks quickly and consistently via queries in the System Log.
  • Configure Okta Administrators based on common roles.
  • Monitor your different Okta components.

Prerequisites:

-or-

Setup Requirements: 

  • Zoom: Check your compatibility in advance at https://zoom.us/test
  • Students use their own computers.
  • Okta provides access to an Okta tenant + virtual machine to complete the labs.

Advanced Security: Protect the Modern Perimeter with Okta

Event Date Spaces left Actions
Advanced Security: Protect the Modern Perimeter with Okta (Oct 7-8 / EMEA) (RCT20H)
Advanced Security (Oct 7-8 / EMEA) Day 1 (RCT20H)
Advanced Security (Oct 7-8 / EMEA) Day 2 (RCT20H)
View Events
-
12
Advanced Security: Protect the Modern Perimeter with Okta (Oct 14-15 / AMER-Central) (RCT20H)
Advanced Security (Oct 14-15 / AMER-Central) Day 1 (RCT20H)
Advanced Security (Oct 14-15 / AMER-Central) Day 2 (RCT20H)
View Events
-
16

Curriculum2 days

  • Advanced Security: Protect the Modern Perimeter with Okta
  • Course Evaluation

About this course

The distributed nature of today’s workforce combined with the volume of in-cloud and on-premise IT resources requires a modern, identity-centric approach to securing your organization's assets and protecting the perimeter.

Using Okta’s Policy Framework, you will gain experience configuring zone-based multifactor enrollment (MFA) policies to govern user and application access. This course explores Okta ThreatInsight’s ability to identify people and device access patterns associated with threat actors or malicious traffic. You’ll use Okta’s contextual response framework to leverage this data to implement effective passwordless authentication policies. Automations and managing log data will strengthen your security posture.  Finally, you learn about meeting compliance standards with Okta.

By attending this course, you will gain the skills to:

  • Enhance your company’s security posture using a rich set of Okta tools.
  • Identify Okta Adaptive MFA capabilities and integration scenarios.
  • Decide the best factors and security policies for distinct business scenarios.
  • Configure MFA enrollment and enforcement policies.
  • Implement MFA using Network Zones and contextual data.
  • Set up Behavior Detection to identify security threats based on login patterns, device context, and location.
  • Configure passwordless authentication.
  • Set up management attestation for desktop devices through Okta's Security Device Integrations.
  • Simplify user lifecycle activity using Okta Workflows and Automations.
  • Detect possible security risks quickly and consistently via queries in the System Log.
  • Configure Okta Administrators based on common roles.
  • Monitor your different Okta components.

Prerequisites:

-or-

Setup Requirements: 

  • Zoom: Check your compatibility in advance at https://zoom.us/test
  • Students use their own computers.
  • Okta provides access to an Okta tenant + virtual machine to complete the labs.

Live events

Advanced Security: Protect the Modern Perimeter with Okta

Event Date Spaces left Actions
Advanced Security: Protect the Modern Perimeter with Okta (Oct 7-8 / EMEA) (RCT20H)
Advanced Security (Oct 7-8 / EMEA) Day 1 (RCT20H)
Advanced Security (Oct 7-8 / EMEA) Day 2 (RCT20H)
View Events
-
12
Advanced Security: Protect the Modern Perimeter with Okta (Oct 14-15 / AMER-Central) (RCT20H)
Advanced Security (Oct 14-15 / AMER-Central) Day 1 (RCT20H)
Advanced Security (Oct 14-15 / AMER-Central) Day 2 (RCT20H)
View Events
-
16

Curriculum2 days

  • Advanced Security: Protect the Modern Perimeter with Okta
  • Course Evaluation