Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cyber Security Foundations: Reinforcing Identity and Access Management

Course Cover
compare button icon

Course Features

icon

Duration

4 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Effort

2 hours per week

icon

Teaching Type

Self Paced

Course Description

Access to restricted data can be controlled through identity and access management. This ensures data security by limiting access to data only to authorized users and in certain contexts.

This course focuses on identity and access management. It is a continuation of the ExpertTrack course. You may find it helpful to complete the first course if you are just starting to learn about identity and access management.

This course will cover real-life scenarios in which access and identity management issues are faced. These will include B2C and enterprise integration. Case studies will be used to illustrate the learning. The use of identity and access management within the public sector will also be covered, including G2C services as well as citizen ID.

Case studies will be used to illustrate how the theory works in practice. You'll be able use the knowledge gained to improve your organization's cyber resilience and data security.

This course in cyber security covers basic topics that will help you understand key topics related to identity and access management. These topics include:

Cyber resilience and data security requirements are constantly evolving. This course will teach you how to create up-to-date access and identity management processes. This course will help you build a solid cybersecurity strategy for your company.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Identify standards used in identity and access management

Describe best practices within identity and access management

Describe single sign on and why it is used

Describe federation identity and management and why it is used

Describe cloud management considerations

Describe the role of cloud management in identity and access management

Identify the different types of models used in cloud management

Describe artificial intelligence and its role in identity and access management

Describe cloud management considerations

Describe Implementation and its role in IdAM

Describe design architecture in IdAM

Target Students

This cybersecurity training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks

This might include data administrators, those working with sensitive data, or those targeting a career in cybersecurity

Course Cover