Identity and Access Management
Identity and Access Management, available at $54.99, has an average rating of 3.05, with 90 lectures, 12 quizzes, based on 10 reviews, and has 57 subscribers.
You will learn about Introduces the basics concepts of Identity and Access control aspects of cyber security for any enterprises. Describes, in detail, on the fundamental workings of frameworks and tools of Identity and Access Management Covers important topics such as Single-Sign-on, Multi-Factor Authentication, OAuth and many other terminologies Exemplifies the concepts, based on the day-to-day examples of incidents, attacks, hackings to drive the concepts of IAM into a thorough understandings. This course is ideal for individuals who are Graduates of IT and CS streams. Those wanting to pursue career on Cyber Security, will be largely benefited. or This course would also help IT Admins, and Cyber Security professionals in refreshing their knowledge on the focused subject of IAM It is particularly useful for Graduates of IT and CS streams. Those wanting to pursue career on Cyber Security, will be largely benefited. or This course would also help IT Admins, and Cyber Security professionals in refreshing their knowledge on the focused subject of IAM.
Enroll now: Identity and Access Management
Summary
Title: Identity and Access Management
Price: $54.99
Average Rating: 3.05
Number of Lectures: 90
Number of Quizzes: 12
Number of Published Lectures: 90
Number of Published Quizzes: 12
Number of Curriculum Items: 102
Number of Published Curriculum Objects: 102
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- Introduces the basics concepts of Identity and Access control aspects of cyber security for any enterprises.
- Describes, in detail, on the fundamental workings of frameworks and tools of Identity and Access Management
- Covers important topics such as Single-Sign-on, Multi-Factor Authentication, OAuth and many other terminologies
- Exemplifies the concepts, based on the day-to-day examples of incidents, attacks, hackings to drive the concepts of IAM into a thorough understandings.
Who Should Attend
- Graduates of IT and CS streams. Those wanting to pursue career on Cyber Security, will be largely benefited.
- This course would also help IT Admins, and Cyber Security professionals in refreshing their knowledge on the focused subject of IAM
Target Audiences
- Graduates of IT and CS streams. Those wanting to pursue career on Cyber Security, will be largely benefited.
- This course would also help IT Admins, and Cyber Security professionals in refreshing their knowledge on the focused subject of IAM
This course deals with the details of Identity and Access Control management and its importance to the enterprises, and without which how large-scale enterprises could be besieged by myriad of problems, due various cyber security threats that is looming large now.
The main agenda of the course include the following:
-
Course Overview
-
Introduction to Identity and Access Management.
-
Importance of Identity and Access Management.
-
Basics, Terminologies & Concepts in IAM.
-
IAM in Enterprise and Cloud Environment.
-
Design and Architecture of IAM Products and Tools.
-
Lifecycle of aspects of IAM.
-
User Access Management in IAM.
-
Privilege Access Management or PAM.
-
Access Provisioning.
-
Multi-factor Authentication and its importance.
-
Session Management & Monitoring of Sessions.
-
User Activity Compliance.
-
Summary, and Conclusion.
The entire course is divided into 14 Sections and 87 Lectures. Twelve of the sections have quizzes section, where in there are 3 – 5 multiple-choice type questions that help in refreshing your knowledge on the course. In all there are 49 Quizzes in this course.
The course is completely close captioned, so that you will not skip any word, sentence or topic. The course has many highlights, including case studies (Colonial Pipeline, IAM Implementation on GIS domain, Enron & Qualcomm non-compliance etc.) Products such as Amazon AWS and its mapping with the IAM Concepts, SitePoint etc. are enunciated to show the workings different IAM tools, under the hood.
Course Curriculum
Chapter 1: Course Overview
Lecture 1: Instructor Introduction
Lecture 2: Introduction
Chapter 2: Introduction to IAM
Lecture 1: What is IAM?
Lecture 2: Components of IAM
Lecture 3: Knowledge Checks
Lecture 4: Closure
Chapter 3: Importance of IAM
Lecture 1: Agenda
Lecture 2: Why is IAM Important?
Lecture 3: How does IAM Help?
Lecture 4: What does IAM provide to Enterprise?
Lecture 5: How IAM Works?
Lecture 6: IAM's role in Organisation Security
Lecture 7: IAM and Compliance
Chapter 4: Basics, Terminologies and Concepts in IAM
Lecture 1: Agenda
Lecture 2: Basics
Lecture 3: Terminologies
Lecture 4: Concepts – Security Assertion Markup Language
Lecture 5: Concepts – OAuth
Lecture 6: Concepts – OpenID Connect
Lecture 7: Concepts – Lightweight Directory Access Protocol
Lecture 8: Concepts – Active Directory and Other Important Concepts
Chapter 5: IAM in Enterprise and Cloud Environments
Lecture 1: Agenda
Lecture 2: What is an Enterprise?
Lecture 3: What is Cloud?
Lecture 4: Enterprise and Cloud
Lecture 5: IAM Implementation in Enterprise Cloud
Lecture 6: IAM and Compliance in Cloud
Lecture 7: IAM and Directory Services in Cloud
Chapter 6: Design and Architecture of IAM
Lecture 1: Agenda
Lecture 2: Challenges of IAM
Lecture 3: IAM Architecture
Lecture 4: Typical Implementation of IAM Architecture
Lecture 5: IAM Services to Enterprises
Lecture 6: IAM Architecture Example
Lecture 7: IAM Architecture Implementation
Chapter 7: IAM Lifecycle
Lecture 1: Agenda
Lecture 2: What is Lifecycle?
Lecture 3: Lifecycle of IAM
Lecture 4: Centralisation of IAM
Chapter 8: User Access Management
Lecture 1: Agenda
Lecture 2: Users of Enterprise
Lecture 3: Roles in Enterprise
Lecture 4: Typical Roles in an Enterprise
Lecture 5: Basics of User Access Management
Lecture 6: Effective User Access Management
Lecture 7: Examples of User Access Management
Lecture 8: Workings of User Access Management
Lecture 9: SSO and User Access Management
Lecture 10: MFA and User Access Management
Lecture 11: SAML and User Access Management
Lecture 12: Active Directory and User Access Management
Chapter 9: Privilege Access Management
Lecture 1: Agenda
Lecture 2: What are Privileges?
Lecture 3: Privileged Users
Lecture 4: What is Privilege Access Management?
Lecture 5: Context-based Privilege Access Management
Lecture 6: Why is Privilege Access Management important?
Lecture 7: Workings of Privilege Access Management
Lecture 8: How is Privilege Access Management different from User Access Management?
Lecture 9: Benefits of Privilege Access Management
Lecture 10: Privilege Access Management Best Practices
Chapter 10: Access Provisioning
Lecture 1: Agenda
Lecture 2: What is Access Provisioning?
Lecture 3: Types of Access Provisioning
Lecture 4: Access Provisioning and SAML, SSO, OAuth and OpenID Connect
Lecture 5: Comparing and Contrasting SAML, SSO, OAuth and OpenID Connect
Chapter 11: Multi-factor Authentication
Lecture 1: Agenda
Lecture 2: What is Multi-Factor Authentication?
Lecture 3: How Multi-Factor Authentication Works?
Lecture 4: Benefits of Multi-Factor Authentication
Lecture 5: Limitation of Multi-Factor Authentication
Lecture 6: Multi-Factor Authentication Methods
Chapter 12: Session Management and Monitoring
Lecture 1: Agenda
Lecture 2: What is Session Management?
Lecture 3: What is Privileged Session Management?
Lecture 4: Active Session Monitoring
Lecture 5: Tools for Session Monitoring
Lecture 6: Best Practices
Instructors
-
Dr. Kumar B V
Enterprise Architect & Consultant, Web and Mobile trainer
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 1 votes
- 3 stars: 2 votes
- 4 stars: 2 votes
- 5 stars: 2 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024