Okta Training

Okta's Secure Identity Commitment (OSIC) Learning Series

Course Overview

Ensure that you have the right Identity configuration from the get go. As part of Okta's Secure Identity Commitment (OSIC) it's important to deploy Okta products using Okta security best practices. Misconfigured Identity is just another entry point for a bad actor or negligent insider. This collection of short, self-paced courses will help you understand some of the key areas to focus on as part of that effort.

Important topics covered in this series: 

  • Promote the use of phishing-resistant authenticators.
  • Apply strong authentication policies to groups with administrator privileges.
  • Monitor your Okta org or Auth0 tenant to view tasks, reports, and insights that will aid in shoring up your security perimeter.
  • Enforce layered security measures across pre-authentication, authentication and post-authentication stages.
  • Ensure that only the right people–especially administrators–have the right level of access to the right resources—under the right conditions, and at the right time.

Workforce Identity Courses

  • Secure with Assurance
  • Configure Network Zones 
  • Set Up Global Session Policies
  • Set Up Authentication Policies
  • Set Up Password Policies with Self-Service Recovery Capability
  • Explore Endpoint Detection and Response
  • Create Custom Admin Roles
  • Integrate Custom SAML Applications
  • Advanced Configurations of the Okta Active Directory Agent
  • Monitor Your Okta Org
  • Prevent Large-Scale Attacks with ThreatInsight
  • Understand Okta Org Security with OSIC
  • Define the Okta API Security with OSIC
  • Manage Okta Tokens and Permissions
  • Streamline the Process for Requesting and Approving Admin Roles
  • Access the Okta Support Portal

Customer Identity Courses

  • Get Started with Auth0 Tenants | Okta Training Preview
  • Authenticate with Database Connections
  • Configure Password Policies in Database Connections
  • Configure Passkey Policies in Database Connections
  • Define Auth0 Attack Protection
  • Define MFA and its Characteristics in Auth0
  • Explore Authenticator Assurance Levels in Auth0
  • Configure MFA from the Auth0 Management Dashboard
  • Explore Step-up Authentication in Auth0 
  • Implement Step-up Authentication in Auth0 for Web Apps
  • Implement Step-up Authentication in Auth0 for APIs

For additional comprehensive training, check out instructor-led training (Essentials, Advanced Security,

Register
  • Relevant Role

    Administrator + Developer + IAM Professional
  • Learning Method

    On-demand
  • Duration

    Self-Paced
  • Cost

    $0 USD / seat
Register