Take advantage of spring savings with up to 50% off ILT training.

0
Checkout

Cart (0)

Contact Sales

Cybersecurity Specialization – Identity and Access Management

Exclusive - Take an in-depth exploration of Identity and Access Management (IAM) practices, designed for professionals seeking to enhance your expertise in this critical domain.

This course is designed to equip you with the essential knowledge and skills to master complex IAM practices and strategies. We will cover various advanced concepts, frameworks, and technologies that are pivotal in securing and managing digital identities within an organization.

Students will learn essential IAM concepts and terminology, and understand the four pillars of IAM—Authentication, Authorization, User Management, and Central User Repository—and their significance. This course studies the comprehensive framework of policies, processes, and technologies that underpin effective IAM systems. Through a detailed examination of the IAM lifecycle, from identity provisioning to de-provisioning, students will gain a robust understanding of the principles and benefits of Zero Trust Architecture.

Our Cybersecurity Specialization courses follow the 9 pillars of Cybersecurity, providing key skills necessary to be successful as a cybersecurity professional.

  • Global Knowledge Delivered Course
  • Training Exclusives
Virtual Classroom Live | Jun 26 - 27, 2025 | 8:30 AM - 4:30 PM EDT | ONLINE

Who Should Attend?

  • Experienced IT Security Professionals (Min. 1+ years exp.)
  • IAM Administrators
  • System and Network Administrators
  • IT Managers and Directors
  • DevOps Engineers
  • Compliance and Risk Management Professionals
  • Software Developers and Architects
  • Consultants and Advisors

What You'll Learn

  • Define key concepts and terminology associated with advanced IAM practices.
  • Identify the four pillars of IAM and their significance in identity and access management.
  • Explain the framework of policies, processes, and technologies in IAM.
  • Describe the stages of IAM, from identity provisioning to de-provisioning.
  • Understand the principles and benefits of Zero Trust Architecture in IAM.
  • Implement advanced authentication mechanisms such as biometric and passwordless authentication.
  • Configure Attribute-Based Access Control (ABAC) and Policy-Based Access Control (PBAC) policies.
  • Set up Single Sign-On (SSO) and Identity Federation between multiple systems.
  • Conduct role mining and access certification using Identity Governance and Administration (IGA) tools.
  • Analyze the challenges and solutions for IAM in multi-cloud environments.
  • Examine identity analytics and intelligence to detect anomalies and enhance security.
  • Evaluate the effectiveness of Privileged Access Management (PAM) solutions in managing privileged accounts.
  • Design a comprehensive IAM framework incorporating policies, processes, and technologies.
  • Develop an advanced IAM solution, integrating IAM with DevOps pipelines and implementing secrets management.
  • Create a simple decentralized identity solution using blockchain technology.
  • Assess IAM implementations for compliance with regulatory requirements such as GDPR and HIPAA.
  • Review and critique real-world case studies of complex IAM implementations to derive best practices.
  • Evaluate the impact of emerging trends such as AI, machine learning, and Identity as a Service (IDaaS) on IAM strategies.

Course Outline

Advanced IAM Concepts
  • Understanding the Framework of Policies, Processes, and Technologies
  • The Four Pillars of IAM
  • Advanced Authentication Mechanisms
  • Identity Federation and SSO
  • Identity Governance and Administration (IGA)
  • Case Studies and Real-World Scenarios
  • Interactive Discussion: Group discussion on case studies
Practical Applications and Emerging Trends
  • IAM in Multi-Cloud Environments
  • Identity Analytics and Intelligence
  • Blockchain and Decentralized Identity
  • IAM Compliance and Regulatory Requirements
  • Stages of IAM
  • Emerging Trends in IAM
  • Interactive Discussion: Group discussion on the impact of emerging trends
BUY NOW

Prerequisites

  • Familiarity with basic IAM concepts and technologies.
  • Practical experience with IT systems, networking, and basic security practices.
  • A keen interest in learning about advanced IAM technologies and practices.
$1495
GK# 840100 Vendor# IAM
Your Selections:
Virtual Classroom Live
2 Days: Jun 26 - Jun 27
8:30 AM - 4:30 PM EDT
Location: ONLINE
Access Period: