Identity and Access Management (IAM)
- Offered byUDEMY
Identity and Access Management (IAM) at UDEMY Overview
Duration | 3 hours |
Total fee | ₹1,280 |
Mode of learning | Online |
Credential | Certificate |
Identity and Access Management (IAM) at UDEMY Highlights
- Earn a Certificate of completion from Udemy
- Get a 30 days money back guarantee on the course
- Get full lifetime access of the course material
- Learn from 1 downloadable resources
Identity and Access Management (IAM) at UDEMY Course details
- For IT and Cyber Security Students
- For Information Security Team members
- For Information Security Professional
- For Chief Information Security Manager
- For IT professionals
- Identity and Access Management (IAM)
- Privileged Account Management (PAM)
- Identity Governance and Administration (IGA)
- Data Governance and Protection
- Identity and Access Management is a fundamental and critical cybersecurity capability, to ensure the right people and things have the right access to the right resources at the right time
- Learn about different components of Identity and Access Management, security considerations and some labs and examples
Identity and Access Management (IAM) at UDEMY Curriculum
Introduction
Domain 1 - Identification, Authentication, Authorization & Accounting(IAAA)
Domain 1 - Introduction and Summary
CIA Principles
IAAA operation
Some Important Security Concepts
Kerberos
Identity federation & SSO
Web Services Federation and OAuth
Authentication Factors
Biometrics
Optional - Lab 1-1
Optional - Lab 1-2
Optional - Lab 1-3
Optional - Lab 1-4
Optional - Lab 1-5
Domain-2 Privileged Account Management
Domain 2 Privileged Access Management
Privileged Accounts
Privileged Account and Session Management
Privileged Account Monitoring
Application Whitelisting
Optional - Lab 2-1
Optional - Lab 2-2
Section - 4 Identity Governance and Administration (IGA)
Domain 3 Identity Governance and Administration (IGA)
User Onboarding
User Termination & Role changes
Access Controls & RBAC
Access validation & Certification
Segregation of Duties, Auditing and Reporting
System for Cross-domain Identity Management
Optional - Lab 3-1
Optional - Lab 3-2
Optional - Lab 3-3
Section - 5 Data Governance and Protection
Domain 4 - Data Governance and Protection
Data Types
Intellectual property
Data Classification
Industry and local laws and regulations
Data Type Management & Monitoring
Security Policy Framework
Data Breach and Incident Response Process
Notifiable Data Breaches
Optional - Lab 4-1
Optional - Lab 4-2
Optional - Lab 4-4