Live Webinar - ITIL 4 Overview - What’s New from ITIL v3 to ITIL 4

closeClose

IBM Emptoris Contract Management-Security Model (V10.0.1)

Course Details
Code: 6D115G-WBT
Tuition (USD): FREE • Self Paced (1.5 hours)
Generate a quote

This IBM Web-Based Training (WBT) is Self-Paced and includes:
- Instructional content available online for duration of course
- Visuals without hands-on lab exercises

This course covers the important topic of Security. In it, we discuss in detail the two pillars of Contract Management functionality that were deployed together to craft a viable, effective Security system for our training platform.

If the Learning Objectives included in this course description imply the presence of teaching content that interests you, open the course and use the Table of Contents to go directly to the content you require.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

Skills Gained

Security Overview 

  • What is the Relevance to you of the Training Platform Security Model

 

User Groups and Permission Groups 

After completing this lesson, you should be able to:

  • Describe the role of a User Group.
  • Describe the role of Permissions and Permission Groups.

Pillar One: Job Roles, User Groups and Permission Groups

After completing this lesson, you should be able to:

  • Describe the role of Job Roles in our Security System
  • Describe the role of User Groups and Permission Groups vis-a-vis Job Role.

Pillar Two: Organization as a Security Vehicle

After completing this lesson, you should be able to:

  • Demonstrate an understanding of the Organizational structure of the version of Contract Management that is used in class.
  • Describe the role and importance of a contract- s Owning Organization.
  • Describe the role and importance of the relative position of a User Id in a Contract Management system- s overall Organization structure.
  • Describe the relationship between Owning Organization and User ID Organizational placement in determining contract visibility.

Who Can Benefit

This course is designed for Contract Creators.

Prerequisites

None

Course Details

Course Outline

  • Security Overview 
  • User Groups and Permission Groups 
  • Pillar One: Job Roles, User Groups and Permission Groups
  • Pillar Two: Organization as a Security Vehicle