Fundamentals of Identity and Access Management

Current Status
Not Enrolled
Price
Closed
Get Started

With over 5+ years of specialized expertise in the sector, our training instructor has meticulously crafted the Fundamentals of Identity & Access Management course/training to ensure comprehensive mastery of the subject. Identity and Access Management is an introductory training covering all the necessary topics that a beginner would require to learn. It includes key concepts such as identification, authentication, accounting, and many more, along with the technologies that you will require to learn. You will also learn how to manage passwords, control your log data, centralize accounting, and more. By the end of the training session, you will have a conceptual understanding of IAM, its key concepts & technologies, privilege access management, organizational process and GRC.

INTRODUCTION TO IAM

  • What is IAM and why it is used?  
  • Access Control Models 
  • What is IAM and why it is used?  
  • Access Control Models 

KEY CONCEPTS & TECHNOLOGIES

  • Identification
  • Authentication
  • Accounting
  • Authorization
  • Authentication vs Authorization
  • SSO, Federation, SAML
  • Directory Services
  • Kerberos
  • LDAP
  • Active Directory
  • OSI Layers
  • PKI
  • Hashing
  • Salting

PRIVILEDGE ACCESS MANAGEMENT

  • PAM/Privileged accounts
  • Password management
  • Adaptive Authorization
  • Account auditing
  • Log data’s & controls
  • Centralized Accounting

ORGANIZATIONAL PROCESS

  • Creating Identity, Assigning credentials & derived credentials
  • Request Life Cycle (Raising, Review, Approval) (Single & Bulk requests)
  • Provisioning / De-Provisioning
  • Self Service
  • Change Management
  • Controls & Monitoring Processes
  • Access Reviews
  • Reporting Process
  • Manual & Automation requests
  • Automated Processing & Automations
  • Credentials Issuance
  • Escalations & Matrix

GRC

  • Compliance & Frame works
  • What is Policy and procedures
  • Risk
  • Identity Lifecycle
  • Auditing
  • ISO 27001
  • Stakeholders (or) Application Owners
  • Asset Management

Similar Courses:

Introduction to Identity and Access Management Training

Introduction to Identity and Access Management Training

An overview of IAM can be found in the introductory training for Identity and Access…

Data Science with Python Training

Data Science with Python Training

The Data Science with Python training covers essential topics of python that will help you…