WHO IS THIS TRAINING FOR?
Partner consultants and personnel responsible for planning and implementing an onboarding project for iManage Threat Manager at cloudimanage.com
CAN I GET CERTIFIED?
Yes!
Following completion of the training you are invited to register for the iManage Cloud Onboarding Threat Manager certification exam.
HOW LONG WILL THIS TAKE?
Self paced training is designed to be consumed at your own speed, enabling you to consume content and prepare for certification your own schedule. For this course, total content runtime is approximately 90 minutes, however, iManage recommends allowing a minimum of 6 hours to consume all courseware and prepare for your certification exam.
COURSE BREAKDOWN
Expand sections below for an explanation of module contents.
Introduction
An introduction to the iManage Cloud Onboarding Threat Manager program, including course structure, partner, customer and iManage roles for the project, and points of contact
Module 1 - Initiate
A look at the Initiate Kick Off Meeting, including the importance of this meeting, key points to be covered, who should attend, and defining success outcomes for the implementation.
Module 2 - Design
A detailed overview of the steps required during the Design phase of the iManage Threat Manager Cloud Onboarding process. This module looks at key deliverables along with how Threat Manager integrates with other systems. Managing risk and the implementation timeline of Threat Manager with regards to an iManage Work project are also discussed. This module also looks at the Roles available in Threat Manager and planning for the types of users who should be assigned each.
Module 3 - Optimize
A detailed overview of the processes required during a Threat Manager Cloud implementation. This module covers the process of submitting CTR requirements to get the Threat Manager instance provisioned. We then look at ingestion of data and handling of Migration accounts during the process.
Module 4 - Launch
A look at the final steps required in the build up to launch of iManage Threat Manager in the Cloud. This module includes on overview of the process to add Threat Manager to Control Center, and a detailed look at how to complete the Go Live preparation checklist . This module also covers assigning Roles, working with the Global Exclusions List, and validating 'Out of the Box' Detect and Protect rules in-line with iManage best practices, ensuring customers get the most out of the solution on launch.
Module 5 - Adopt and Evolve
This module covers the importance of supporting customers in continuously refining and adjusting Threat Manager rules as an ongoing process. It also includes recommended rules and best practices for various features so your customer can get the most out of Threat Manager. iManage tools available for ongoing help and support are also covered.
Module 6 - Troubleshooting and Working with Support
An overview of the methods available to submit support tickets to iManage Cloud Support during Threat Manager onboarding, implementation, and beyond.
REGISTER NOW
Select below to register for the training or exam: