Select a tile or scroll to view course information

Who is this training for?

Can I get certified in this course?

How long will this take?

What is included in this course?

Register now


Who is this training for?



iManage Threat Manager administrators and users who want to improve their knowledge and maximize the efficacy of iManage Threat Manager, on-premise or in the iManage Cloud. 


Can I get certified?

Yes!

Following completion of the self-paced training, you're invited to register for the iManage Threat Manager Administrator exam. On passing the exam, you'll earn a digital badge from Credly.

Learn more about badging here.


How long will this take?


Self paced training is designed to be consumed at your own speed, enabling you to consume content on your own schedule. 

For this course, iManage recommends allowing a minimum of 4 hours to consume all courseware.

 


Included with useiManage Premium


useiManage Premium subscribers can utilize one of their self-paced training entitlements to register for this course and the certification exam.


Course breakdown

Expand each module below for an explanation of contents

Module 1 - Introduction to iManage Threat Manager

Introduces you to iManage Threat Manager, including the challenges it overcomes and the benefits of the software, as well as a quick overview of how iManage Threat Manager alerts you to at risk behaviors.

Module 2 - Getting Started with iManage Threat Manager

For on-premise customers, this module covers an overview of where you can obtain the software and a high-level look at establishing the iManage Threat Manager appliance.

Module 3 - Interface

A brief introduction to allow you to get familiar with, and learn to navigate, the iManage Threat Manager homepage and interface.

Module 4 - Configuration

An overview of the Configuration tasks available, ranging from general settings, email templates, system settings, robot training inputs and roles.

Module 5 - Detect and Protect

An in depth look into the Detect and Protect feature. Includes an explanation of what Detect and Protect is, how to create Detect and Protect Rules, how to work with the alerts generated, and some best practice recommendations to get the most from the rules.

Module 6 – Behavior Analytics

An in depth look at the Behavior Analytics feature. Includes an explanation of what the feature does and the benefits, how to create rules, best practices, perform analysis and manage result.

Module 7 – Matter Activity

An in depth look at the Matter Activity feature. Includes an explanation of the feature, how to create rules and how to manage results.

Module 8 – Compliance

A look at the compliance feature, what it is used for, how to generate compliance reports and monitor adoption trending with iManage Work.

Module 9 - Outliers

Introduces the concept of Outlier Analysis and covers how to perform outlier analysis and manage results.


Register now

Select below to register:

Administrators


iManage Partner? Select below to register:

Partners