Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Diploma in Identity and Access Management

Course Cover
compare button icon

Course Features

icon

Duration

15 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Teaching Type

Self Paced

icon

Video Content

15 hours

Course Description

This free online course on identity and access management will show you how to analyze the functions of ‘assets’ in an IAM system, as well as the impact of perimeter security management (in other words, securing the network’s servers, workstations and databases with a variety of tools). Other important factors such as governance, organizational process and standard approaches in IAM are also broken down for you. Next, you will learn the importance of Cloud services in providing IAM coverage, and the practical implementation of strategies and solutions that cover a variety of scenarios. This training course also explains the functions of software and infrastructure services in IAM management. The impact of significant changes in IAM technology will be examined, and you will get an in-depth understanding of vital functions like authentication, ticket-granting servers and standard JavaScript notations that can be optimized for Internet-based applications. You will also consider resource implications in the implementation, transition and migration of identity and access management systems. This free course will be of interest to IT professionals looking to broaden their skills and developers who want a more complete understanding of the overarching concepts of contemporary IAM.

Course Overview

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Analyze how to manage various processes in organizations

Analyze the radio frequency identification token and how RFID tags transmit data

Describe the features of authentication reuse in identity management

Discuss the functions of cloud services in IAM 

Discuss the process of implementing IAM systems

Evaluate the impact of technology on the evolution of IAM

Explain the concept of identity and access management (IdAM or IAM)

Identify different types of provisioning in organizational processes

Outline various access management and guidance standards

Course Cover