EFT™ Professional Certification Course

FOR ADMINISTRATORS THAT ARE RESPONSIBLE FOR EFT AND MUST INTERACT WITH END-USERS AND INTERNAL PROCESSORS.

Who should attend?

Administrators that are responsible for EFT and must interact with end-users and internal processes would benefit from this 5-day course. Like the EFT Administrator Certification Course, the EFT Professional Certification Course provides information and practice for everyday administrative guidelines, extensive user account control, and post-processing workflow, with a more in-depth look at each of the modules, automation, and practical use of the API.

Objectives of this course

In this course, you will learn about:

  • Installing, upgrading, and activating EFT
  • Administration, configuration, and monitoring of EFT
  • Creating and managing user accounts
  • Troubleshooting connection issues
  • The Event Rule system
  • Custom commands
  • Ways to log and track issues
  • Limitations of using the administration interface
  • Copying and creating backups of configuration files
  • Navigating the VFS system
  • Identifying permissions on the VFS tab using GS Auth/LDAP/ODBC
  • AD authentication permissions and how they work
  • Creating virtual directories and why they are used
  • Troubleshooting login issues for user and/or administrator accounts
  • EFT clients

DAY 1: BASIC UNDERSTANDING OF EFT

Lesson 1 – Introduction to EFT

In this lesson, you’ll be introduced to the components, features, and purpose of EFT.

Lesson 2 – Server Administration

In this lesson, you’ll learn how to use the administration interface to configure EFT.

DAY 2: BASIC ADMINISTRATION INTERFACE

Lesson 3 – Monitoring EFT Activity

In this lesson, you’ll learn about EFT logging and reporting.

Lesson 4 – Managing Connections To EFT

In this lesson, you’ll learn about creating Sites through which users log in to EFT, creating “virtual” folders, and configuring security.

Lesson 5 – Settings Templates, User Accounts, and Permissions Groups, Event Rules

In this lesson, you’ll learn about creating accounts to log in to EFT, and defining account permissions.

Lesson 6 – Event Rules

In this lesson, you’ll learn about automating file management in EFT.

DAY 3: EFT MODULES

Lesson 7 – HSM Module

In this course, you’ll learn about creating an EFT Site that provides stricter security settings and reporting.

Lesson 8 – AS2 Module

In this course, you’ll learn how to exchange structured business data securely using the HTTP or HTTPS protocol.

DAY 4: EFT MODULES, continued

Lesson 9 – Advanced Workflow Engine

In this course, you’ll learn how to to design scripts, batch files, macros, or any other code-intensive process using an easy drag-and-drop interface, and then add them to Event Rules.

Lesson 10 – DMZ Gateway

In this course, you’ll learn how to provide secure communication with EFT behind intranet firewalls without requiring any inbound firewall holes between the internal network and the network’s DMZ.

DAY 5: EFT MODULES, continued

Lesson 11 – SAT Module

In this course, you’ll learn how to allow your internal users to send and receive large e-mail file attachments to recipients outside of your organization quickly, reliably, and securely, without having to manually create or maintain FTP accounts on EFT.

Lesson 12 – Web Transfer Client

In this lesson, you’ll learn how you can allow users to exchange files using EFT over HTTP or HTTPS using a Web browser.

Lesson 13 – COM API

In this lesson, you’ll learn how to interact with EFT directly from your own custom applications using a COM-enabled programming language and integrated development environment (IDE).

REFERENCE MATERIAL

The Globalscape website provides a variety of information about Globalscape products, including:

Items not mentioned above as “In-Scope Services” are out of the scope of this training. The following areas are specifically identified as being out of scope:

  • WANs and telecommunications
  • Desktops, helpdesk, and Level 1 support
  • Services provided for new applications or services provided for applications not in-scope