Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

ISAA: Identity Security Mastery

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course provides you with a complete, hands‑on understanding of how Saviynt Identity Cloud streamlines access requests, automates approvals, and strengthens access governance using intelligent insights and AI‑powered recommendations. You will begin by learning how end‑users navigate the Access Request System—submitting requests, selecting applications, and understanding request types through real interface walk-throughs and demos. Next, you will explore how approvers review, validate, and act on access requests using Saviynt’s policy-driven approval workflows. You will understand how intelligent insights, risk indicators, and AI‑driven recommendations help approvers make faster, more accurate, and more compliant decisions. In the third module, you will learn how Saviynt enhances governance through Access Reviews, enabling managers to validate user access, detect anomalies, and remediate risk. You will see how recommendations streamline review decisions by highlighting unusual access, excessive entitlements, or policy violations. By the end of the course, you will have a strong practical understanding of how Saviynt automates access, improves approval quality, enforces least privilege, and ensures continuous identity governance across the enterprise.

Syllabus

  • Navigating the Access Request System
    • In this module, you will learn how Saviynt Identity Cloud simplifies and automates the process of requesting access to applications, roles, and entitlements. You’ll begin with an overview of the Access Request System and explore how Saviynt enables business users, managers, and IT administrators to seamlessly request the access they need. Through guided explanations and demos, you will learn how to navigate the Access Request interface, search for applications, understand request types, and submit access requests correctly. You will also explore how Saviynt’s Application Access Request workflow streamlines self-service access requests using intelligent forms, pre‑configured catalogs, and automated policies. Finally, you will learn the five key reasons organizations automate self-service access requests, including efficiency, reduced workload, standardized controls, faster onboarding, and improved compliance. By the end of this module, you will have hands-on familiarity with Saviynt’s Access Request experience—an essential foundation for identity governance, compliance, and secure user enablement.
  • Approval Workflows and Intelligent Insights
    • In this module, you will explore Saviynt’s Access Approval workflows and how intelligent insights guide approvers toward informed and compliant decisions. You’ll begin by understanding the application access approval process—how requests move from submitter to approver through dynamic, policy-driven workflows. You will then walk through demos showing real approval screens that highlight user context, risk indicators, request details, and pending tasks. Next, you will learn how Saviynt uses AI-driven Recommendations to improve the quality of approval decisions. Recommendations help approvers detect unusual access, compare access with peers, and identify potential risk before granting access. These insights serve as built-in guardrails that support access justification, separation-of-duties evaluations, and policy validation. By the end of this module, you will understand how approvers use Saviynt’s intelligent workflows to efficiently manage access requests with improved accuracy, reduced risk, and full auditability.
  • Access Governance and Recommendations
    • In this module, you will learn how Saviynt strengthens identity governance through Access Reviews and AI-powered Recommendations that improve certification quality and reduce compliance risk. You will begin with an overview of Access Reviews and understand why recurring certifications are essential for enforcing least privilege and meeting regulatory requirements. You will then explore User Manager Access Reviews—one of the most common certification campaigns—and understand how Saviynt provides managers with context, insights, and risk indicators when certifying access. Through demos, you will see how reviewers take action, revoke access, make justifications, and identify anomalies. Finally, you will learn how Recommendations in Access Reviews enhance decision-making by detecting excessive access, comparing peers, and highlighting risk factors. Saviynt’s intelligent governance framework reduces reviewer fatigue, improves accuracy, and ensures compliance throughout the identity lifecycle.
  • Saviynt Identity Security for the AI Age (ISAA) Specialization Exam
    • In this module, you will prepare for the ISAA Specialization Exam by reviewing key concepts across access requests, approvals, recommendations, and access governance. You will understand the structure of the exam, the types of questions included, and the knowledge areas assessed. This module ensures you are ready to validate your mastery of Saviynt Identity Cloud’s access workflows, governance capabilities, and intelligence-driven insights.

Taught by

Saviynt University

Reviews

Start your review of ISAA: Identity Security Mastery

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.