Exam objective | Course | Module | Lesson |
Security | |
a. Understand IBM Domino certifiers | ND9SA1 | 3
3 | Understanding ID Files
Expanding the Organization's Naming Hierarchy |
b. Understand IBM Notes Shared Login (NSL) | ND9SA2 | 4 | Notes Shared Login |
c. Understand the seven levels of security | ND9SA1 | 3 | Module 3 - Security (Several lessons) |
d. Understand different levels of encryption | ND9SA2 | 4
4
4 | Registering New Users
Password Control
User and Server Key Rollover |
e. Understand the internet password | ND9SA1 | 6
6 | Enabling Web Access
Accessing Domino Database Elements |
f. Design a certificate structure | ND9SA2 | 4 | Expanding the Organization's Naming Hierarchy |
g. Create an ID Vault | ND9SA2 | 4 | ID Vault |
h. Manage an ID Vault | ND9SA2 | 4 | ID Vault |
i. Configure ID Backup and Recovery | ND9SA2 | 4 | User ID and Password Recovery |
j. Configure Certificate Authority | ND9SA2 | 4 | The Certificate Authority Process |
k. Manage the Certificate Authority Process | ND9SA2 | 4 | The Certificate Authority Process |
l. Manage XPages Security | ND9SA2 | 3 | Guarding Against Malicious Code |
m. Configure Key Rollover | ND9SA2 | 4 | User and Server Key Rollover |
n. Understand the Credential Store | ND9SA2 | 7 | Domino Server with Shindig Configuration |
o. Utilize Access Control List (ACL) and Execution Control List (ECL) security | ND9SA1 | 3 | Database Security
The Execution Control List |
p. Understand SAML | ND9SA2 | 4 | Security Assertion Markup Language (SAML) |
q. Understand protected groups | ND9SA1 | 3 | Group Administration |
r. Understand Readers and Authors fields | ND9SA1 | 3 | Database Security |
s. Understand Full Access Administration and other options | ND9SA1 | 3 | Administrator Rights |
t. Understand Java policy file | ND9SA2 | 3 | Guarding Against Malicious Code |
u. Understand differences between IBM Domino and Internet certificates | ND9SA1
ND9SA2
ND9SA2 | 6
3
4 | Browser Security using SSL
Understanding ID Files
The Certificate Authority Process |
v. Install SSL certificate | ND9SA1 | 6 | Browser Security Using SSL |
w. Understand session authentication | ND9SA1 | 6 | Session Authentication |
x. Utilize hidden design | ND9SA2 | 3 | Design Templates |
y. Understand password management | ND9SA2 | 4 | Password Control |
Messaging | |
a. Understand IBM Protector concepts | ND9SA2 | 8 | IBM Protector for Mail Security |
b. Understand IBM iNotes configuration | ND9SA2 | 6 | iNotes |
c. Understand IBM iNotes redirection | ND9SA2 | 6 | iNotes |
d. Configure messaging | ND9SA1 | 4 | Module 4 - Mail Routing (several lessons) |
e. Configure SMTP rules | ND9SA2 | 6 | SMTP Restrictions and Controls |
f. Understand message delivery restrictions and controls | ND9SA2 | 6 | Mail Rules
SMTP Restrictions and Controls |
g. Track messages | ND9SA2 | 6 | Mail Tracking and Reporting |
h. Understand MIME mail options | ND9SA1
ND9SA2 | 4
6 | SMTP Mail Transfer
Internet Mail Clients |
i. Understand native IBM Notes mail routing | ND9SA1 | 4 | Domino Mail Routing Basics |
j. Manage IBM Notes Traveler functionality | ND9SA2 | 6 | IBM Notes Traveler |
User Management | |
a. Manage Roaming Users | ND9SA2 | 4 | Roaming Users |
b. Move userrs | ND9SA2 | 4 | User and Group Changes |
c. Register users | ND9SA2 | 4 | Registering New Users |
d. Rename users | ND9SA2 | 4 | User and Group Changes |
e. Recertify users | ND9SA2 | 4 | User and Group Changes |
f. Utilize the Single User to Multi-User Migration tool | ND9SA2 | 4 | Registering New Users |
g. Manage a user's group membership | ND9SA2 | 4 | Notes Client Installation and Setup |
h. Utilize Smart Upgrade/Deployment Kit | ND9SA2 | 4 | Notes Software Updates |
i. Understand the Notes Install Cleanup Executable tool (NICE) | ND9SA2 | 4 | Notes Client Installation and Setup |
j. Understand DOLS (Domino Off-Line Services) | ND9SA2 | 8 | Domino Off-Line Services (DOLS) |
k. Understand types of policies (org, explicit, dynamic) | ND9SA2 | 4 | Policies |
l. Understand policy settings | ND9SA2 | 4 | Policies
Policy Hierarchies and Inheritance |
m. Understand relationship between settings and policies | ND9SA2 | 4 | Policies
Settings Documents |
n. Configure policies | ND9SA2 | 4 | Policies
Policy Hierarchies and Inheritance
Settings Documents |
o. Manage settings with formulas, including machine-specific settings | ND9SA2 | 4 | Settings Documents |
p. Deploy policies | ND9SA2 | 4 | Policies
Settings Documents |
q. Troubleshoot policies | ND9SA2 | 4 | Policies
Policy Hierarchies and Inheritance
Settings Documents |
Replication | |
a. Understand replication | ND9SA1 | 5 | Replication Fundamentals |
b. Understand cluster replication | ND9SA1 | 5 | Clustering |
c. Understand managed replication | ND9SA2 | 4 | Settings Documents |
d. Set up clustering | ND9SA1 | 5 | Clustering |
e. Understand replication restrictions | ND9SA1 | 5 | Controlling What Replicates |
f. Configure PIRC (Purge Interval Replication Control) | ND9SA1 | 5 | Replication Fundamentals
Controlling What Replicates |