Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights

Identity and Access Management

Course Summary

This course provides a guide to designing, implementing, and managing modern Identity and Access Management (IAM) frameworks. It balances the needs of enterprise security (EIAM) with customer identity requirements (CIAM), offering deep dives into authentication protocols, identity lifecycle automation, governance, and cloud security best practices. Participants will gain the strategic and technical expertise required to lead robust identity programs and effectively mitigate modern cyber risks.

Prerequisites

To get the most of this session, participants should have:

  • Familiarity with basic networking and general cybersecurity concepts
  • Understanding of IT infrastructure components (servers, databases, applications)
  • Basic knowledge of operating systems and web application architecture 
  • Basic understanding of authentication flows and common directory structures
     
Purpose
Design, implement, and manage modern Identity Access Management (IAM) frameworks
Audience
IT and Security Professionals with a basic understanding of IAM concepts looking to design, implement, and manage an IAM framework
Role
IAM Architects and Engineers | Security Analysts and Consultants | IT Auditors and Compliance Officers | Cybersecurity Managers and CISOs | Application Developers working with authentication/authorization
Skill level
Intermediate
Style
Lecture | Hands-on Activities
Duration
4 days
Related technologies
Networking | Cloud

 

Learning objectives
  • Design a secure and scalable IAM architecture using industry-standard protocols
  • Implement robust authentication strategies, including phishing-resistant Multi-Factor Authentication (MFA) and Passwordless solutions
  • Develop an Identity Governance and Administration (IGA) strategy for continuous access review, compliance, and policy enforcement
  • Design and deploy Privileged Access Management (PAM) controls
  • Apply Zero Trust principles to modern identity practices across hybrid and multi-cloud environments

What you'll learn:

In this Identity and Access Management course, you'll learn:

IAM Fundamentals and Architecture

  • Introduction to Digital Identity and IAM
  • Enterprise (EIAM) vs Consumer (CIAM)
  • The Four Pillars of IAM: User Management, Authentication, Authorization, and Identity Governance
  • Foundational Directory Services
  • Security Principles in IAM:Principle of Least Privilege (PoLP) and Segregation of Duties (SoD)

Identity and Account Lifecycle Management

  • User Provisioning and Onboarding
  • Entitlement Management and Role Modeling
  • Account Modification and Change Management
  • De-provisioning and Offboarding

Authentication and Credential Security

  • Authentication Factors and Methods
  • Multi-Factor Authentication (MFA) Implementation
  • Password Management and Vaulting
  • Passwordless Authentication

Advanced Access Management Protocols and Federation

  • Single Sign-On (SSO
  • SAML 2.0 (Security Assertion Markup Language)
  • OAuth 2.0 and OpenID Connect (OIDC)
  • API Security and Token Management

Identity Governance and Administration (IGA)

  • The IGA Framework: Architecture and purpose of IGA tools
  • Access Review and Certification Campaigns
  • Audit, Logging, and Reporting
  • Regulatory Compliance in IAM: supporting mandates like GDPR, HIPAA, SOX, and PCI DSS

Specialized IAM Domains

  • Privileged Access Management (PAM)
  • Customer Identity and Access Management (CIAM)
  • IoT and Machine-to-Machine Identity
  • Decentralized Identity (DID) and Blockchain Concepts

Cloud Identity and Modern Security Strategy

  • IAM in Cloud Environments
  • Cloud Infrastructure Entitlement Management (CIEM)
  • Zero Trust Architecture (ZTA)
  • Adaptive and Risk-Based Access Control

Implementation and Strategy

  • IAM Program Management
  • Choosing and Implementing IAM Solutions: Evaluating IGA, PAM, and Access Management tools
  • Troubleshooting Common IAM Issues
  • Future Trends in IAM

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By clicking submit, you agree to our Privacy Policy and Terms of Use, and consent to receive marketing emails from Pluralsight.