Cyber Security Foundations: Reinforcing Identity and Access Management
Course Features
Duration
4 weeks
Delivery Method
Online
Available on
Lifetime Access
Accessibility
Mobile, Desktop
Language
English
Subtitles
English
Level
Advanced
Effort
2 hours per week
Teaching Type
Self Paced
Course Description
Course Overview
Alumni Network
International Faculty
Case Based Learning
Post Course Interactions
Case Studies,Instructor-Moderated Discussions
Skills You Will Gain
What You Will Learn
Identify standards used in identity and access management
Describe best practices within identity and access management
Describe single sign on and why it is used
Describe federation identity and management and why it is used
Describe cloud management considerations
Describe the role of cloud management in identity and access management
Identify the different types of models used in cloud management
Describe artificial intelligence and its role in identity and access management
Describe cloud management considerations
Describe Implementation and its role in IdAM
Describe design architecture in IdAM
Target Students
This cybersecurity training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks
This might include data administrators, those working with sensitive data, or those targeting a career in cybersecurity