In this Identity and Access Management course, you'll learn:
IAM Fundamentals and Architecture
- Introduction to Digital Identity and IAM
- Enterprise (EIAM) vs Consumer (CIAM)
- The Four Pillars of IAM: User Management, Authentication, Authorization, and Identity Governance
- Foundational Directory Services
- Security Principles in IAM:Principle of Least Privilege (PoLP) and Segregation of Duties (SoD)
Identity and Account Lifecycle Management
- User Provisioning and Onboarding
- Entitlement Management and Role Modeling
- Account Modification and Change Management
- De-provisioning and Offboarding
Authentication and Credential Security
- Authentication Factors and Methods
- Multi-Factor Authentication (MFA) Implementation
- Password Management and Vaulting
- Passwordless Authentication
Advanced Access Management Protocols and Federation
- Single Sign-On (SSO
- SAML 2.0 (Security Assertion Markup Language)
- OAuth 2.0 and OpenID Connect (OIDC)
- API Security and Token Management
Identity Governance and Administration (IGA)
- The IGA Framework: Architecture and purpose of IGA tools
- Access Review and Certification Campaigns
- Audit, Logging, and Reporting
- Regulatory Compliance in IAM: supporting mandates like GDPR, HIPAA, SOX, and PCI DSS
Specialized IAM Domains
- Privileged Access Management (PAM)
- Customer Identity and Access Management (CIAM)
- IoT and Machine-to-Machine Identity
- Decentralized Identity (DID) and Blockchain Concepts
Cloud Identity and Modern Security Strategy
- IAM in Cloud Environments
- Cloud Infrastructure Entitlement Management (CIEM)
- Zero Trust Architecture (ZTA)
- Adaptive and Risk-Based Access Control
Implementation and Strategy
- IAM Program Management
- Choosing and Implementing IAM Solutions: Evaluating IGA, PAM, and Access Management tools
- Troubleshooting Common IAM Issues
- Future Trends in IAM