Okta Training

Okta's Secure Identity Commitment (OSIC) Learning Series

Course Overview

Ensure that you have the right Identity configuration from the get go. As part of Okta's Secure Identity Commitment (OSIC) it's important to deploy Okta products using Okta security best practices. Misconfigured Identity is just another entry point for a bad actor or negligent insider. This collection of short, self-paced courses will help you understand some of the key areas to focus on as part of that effort.

Important topics covered in this series: 

  • Promote the use of phishing-resistant authenticators.
  • Apply strong authentication policies to groups with administrator privileges.
  • Monitor your Okta org or Auth0 tenant to view tasks, reports, and insights that will aid in shoring up your security perimeter.
  • Enforce layered security measures across pre-authentication, authentication and post-authentication stages.
  • Ensure that only the right people–especially administrators–have the right level of access to the right resources—under the right conditions, and at the right time.

Workforce Identity Courses

  • Secure with Assurance
  • Configure Network Zones 
  • Set Up Global Session Policies
  • Set Up Authentication Policies
  • Set Up Password Policies with Self-Service Recovery Capability
  • Create Custom Admin Roles
  • Integrate Custom Applications
  • Advanced Configurations of the Okta Active Directory Agent
  • Monitor Your Okta Org
  • Prevent Large-Scale Attacks with ThreatInsight
  • Understand Okta Org Security with OSIC
  • Define the Okta API Security with OSIC
  • Streamline the Process for Requesting and Approving Admin Roles
  • Access the Okta Support Portal

Customer Identity Courses

  • Authenticate with Database Connections
  • Configure Password Policies in Database Connections
  • Configure Passkey Policies in Database Connections
  • Define MFA and its Characteristics in Auth0
  • Explore Authenticator Assurance Levels in Auth0
  • Configure MFA from the Auth0 Management Dashboard
  • Explore Step-up Authentication in Auth0 
  • Implement Step-up Authentication in Auth0 for Web Apps
  • Implement Step-up Authentication in Auth0 for APIs

For additional comprehensive training, check out instructor-led training (Essentials, Advanced Security, Auth0 Authentication) and our on-demand subscription catalog (Premier Le

Register
  • Relevant Role

    Administrator + Developer + IAM Professional
  • Learning Method

    On-demand
  • Duration

    Self-Paced
  • Cost

    $0 USD / seat
Register