Requirements
- Basic understanding of HTTP/HTTPS, cookies, headers, redirects
- Familiarity with SSO concepts (SAML/OIDC) is helpful
- Comfort with Windows/Linux basics and command line
- Basic networking: DNS, ports, proxies, certificates
- (Nice to have) Experience with PingFederate/PingOne or any IdP
Features
- Live Project-Based Training
- Expert-Led Sessions
- Flexible Learning Options
- Interactive Learning
- Study Material
- Globally Recognized Certification
- One-on-One Mentorship
Target audiences
- IAM Engineers / Identity Analysts
- DevOps / SRE handling edge security and deployments
- System Administrators managing gateways and proxies
- Application Support Engineers supporting SSO-integrated apps
- Security Engineers working on access controls and compliance
If you’re working with modern SSO and API security, PingAccess Training is one of the most practical skills you can add. PingAccess sits in front of your apps like a smart reverse proxy—controlling who can reach what, enforcing policies, and giving your team cleaner visibility into access patterns. In this PingAccess Training, you’ll learn how to publish web apps securely, protect APIs, and integrate with enterprise identity flows without turning every change into a firefight.
We keep the course hands-on: policy design, agentless access, header-based auth, JWT validation, and real troubleshooting with logs. You’ll also practice common setups like putting PingAccess in front of internal portals, enabling step-up authentication, and handling session management properly. By the end of this PingAccess Training, you should be able to deploy, configure, and maintain PingAccess confidently—whether you’re supporting a single business app or a full estate behind one gateway.
This is PingAccess Training built for real environments: load balancers, SSL/TLS, HA, and change control. If your org is standardizing access governance, moving apps to cloud, or tightening compliance, this PingAccess Training fits right in.
Curriculum
- 15 Sections
- 0 Lessons
- 10 Weeks
- Module 1: PingAccess Basics & Real-World Use0
- Module 2: Architecture & Components0
- Module 3: Installation & Environment Setup0
- Module 4: Admin Console Walkthrough0
- Module 5: Applications, Sites & Virtual Hosts0
- Module 6: Rules, Policies & Access Decision Flow0
- Module 7: Authentication Integration Fundamentals0
- Module 8: Session Management & User Experience0
- Module 9: Headers, Attributes & Identity Context0
- Module 10: API Protection & JWT Validation0
- Module 11: SSL/TLS, Certificates & Security Hardening0
- Module 12: High Availability & Clustering0
- Module 13: Load Balancer / Reverse Proxy Deployment Patterns0
- Module 14: Logging, Monitoring & Troubleshooting0
- Module 15: Operations: Upgrades, Backup/Restore & Production Readiness0



