YoVDO

Cyber Security Foundations: Identity and Access Management

Offered By: EC-Council via FutureLearn

Tags

Cybersecurity Courses Information Technology Courses Authorization Courses Data Security Courses Identity and Access Management Courses Biometric Authentication Courses

Course Description

Overview

Strengthen data security with identity and access management

This cyber security training course will introduce you to identity and access management.

Identity and access management is a key tool in data security. It describes the processes by which different users are granted certain data permissions and under what contexts.

This supports data security by ensuring that sensitive information can only be accessed by select users, at select times. Through identity and access management, the possibility of breaches and cyber attacks is greatly reduced.

Once cyber resilience is strengthened, you can focus data security processes on key moments of vulnerability. Identity and access management also serve to reduce the risk of human error, the greatest cause of data breaches.

This course will introduce you to key identity management models and tools, to help increase cyber resilience at your organization.

Discover key identity and access management concepts

In this cyber security training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management.

You will learn:

  • what identity and access management means and why it is important
  • the meaning and importance of the identity and management concepts of ‘identification’ and ‘authentication’
  • the meaning and importance of the identity and access management concept of ‘authorisation’
  • the role of organizational data security processes in identity and access management

This is a highly practical cyber security training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you learn at your organization.

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.


Syllabus

  • What is Identity and Access Management?
    • Welcome to the Course
    • What is Identity and Access Management?
    • Governance: Part 1
    • Governance: Part 2
  • Understanding Identification and Authentication
    • Welcome to Week 2
    • Key Concepts: Identification
    • Key Concepts: Authentication
    • Biometric Authentication
    • Summary
  • Understanding Authorization
    • Welcome to Week 3
    • Key Concepts: Authorization Part 1
    • Key Concepts: Authorization Part 2
  • The Role of Organizational Processes in Identity and Access Management
    • Welcome to Week 4
    • Organizational Processes: Part 1
    • Organizational Processes: Part 2

Taught by

EC-Council Educator Team

Related Courses

Access Controls
(ISC)² via Coursera
Accessibilité numérique
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Administração de Sistemas e Serviços de Infraestrutura de TI
Cresça com o Google via Coursera
Administración de sistemas y servicios de infraestructura de TI
Crece con Google via Coursera
Administración de las Tecnologías de la Información
Universidad de Palermo via Coursera