Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Cyber Security Foundations: Identity and Access Management

Course Cover
compare button icon

Course Features

icon

Duration

4 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

2 hours per week

icon

Teaching Type

Self Paced

Course Description

This cyber security training course will teach you about identity and access management. Access management and identity are key tools in data security. This describes how different users can be granted data permissions, and in what contexts. This helps to protect data security by making sure that sensitive information is only accessible by selected users at specific times. Cyber attacks and breaches are greatly reduced by identity and access management. Cyber resilience can be strengthened so that data security processes can be focused on vulnerable moments. Access management and identity management help to reduce human error, which is the leading cause of data breaches. This course will teach you key tools and models for identity management to increase your company's cyber resilience. This cyber security training course will introduce you to key access and identity management concepts. This is the first course in a series that covers identity and access management.

This course will explain: identity management and its importance, what authentication and identification are and why they are important, the significance and importance the identity management concept of authorization', and the role of organizational security processes in access and identity management.

This course is highly practical and aimed at helping you to improve your cyber security skills. The identity and access management concepts that you have learned at work will be immediately applicable to your company.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Describe identity and access management

Explain the importance of identity and access management

Identify important topics to consider in identity and access management

Explain how identification is used in identity and access management

Explain how authentication is used in identity and access management

Describe the different types of permissions used in authorization processes

Explain why organisational processes are important for identity and access management

Target Students

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks This might include data administrators, those working with sensitive data, or those targeting a career in cyber security

Course Cover