
Search
Looking for instructor-led training?
Configuring security policies
-
Challenge
Configuring security policies
2 Tasks
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Configuring customer verification
-
Challenge
Configuring customer verification
2 Tasks
15 mins
-
The business wants to ensure that all customer service representative verify the identity of a customer at the start of an interaction. You have been...
Securing an application using attribute-based access control
-
Challenge
Securing an application using attribute-based access control
4 Tasks
30 mins
-
Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...
Securing an application using role-based access control
-
Challenge
Securing an application using role-based access control
2 Tasks
20 mins
-
In the Employee Evaluation case, TGB provides an optional, case-wide action to update an employee’s goals. The Human Resources (HR) department...
Using RBAC to organize and manage access to case attachments
-
Challenge
Using RBAC to organize and manage access to case attachments
4 Tasks
30 mins
-
Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...