Cyber Security Foundations: Reinforcing Identity and Access Management
Offered By: EC-Council via FutureLearn
Course Description
Overview
Develop your expertise in identity and access management
Identity and access management is the process through which access to restricted data is controlled. This helps data security by making sure only authorized users can access the data, and only in specific contexts.
This identity and access management course follows on from the previous course in this ExpertTrack. If you are new to identity and access management, you may benefit from completing the first course prior to this.
You’ll explore various real-life situations in which identity and access management challenges are raised. These will cover areas such as enterprise and B2C integration, using case studies to illustrate learning. You’ll also explore the use of identity and access management in the public sector, looking at G2C services and citizen ID.
You’ll further use case studies to see how the theory applies in practice. On completing the course, you’ll be able to apply what you learned to boost your organization’s data security and cyber resilience.
Engage with the evolving challenges of identity and access management
This cyber security training course covers general topics to advance your understanding of key identity and access management topics. These include:
- single sign-on authentication
- federation identity and management
- cloud identity management models
- AI in identity and access management
- identity and access management implementation
- identity and access management design architecture
Data security and cyber resilience requirements are in a state of constant evolution. The topics covered in this course will help you build up-to-date identity and access management processes. This will be a crucial part of your organization’s cybersecurity strategy.
This cybersecurity training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cybersecurity.
Syllabus
- Standards and Best Practices for Identity and Access Management
- Welcome to the Course
- Guidance and Standards
- Understanding Single Sign On (SSO) and Federation Identity
- Summary
- Cloud Management and Implementation Processes in Identity and Access Management
- Welcome to Week 2
- Cloud Services: Part 1
- Cloud Services: Part 2
- Implementation
- Summary
- Technologies in the Identity and Access Management Context
- Welcome to Week 3
- Introduction to Technology
- Technologies: Part 1
- Technologies: Part 2
- Technologies: Part 3
- Summary
- Case Studies
- Welcome to Week 4
- Citizen Identification Proof
- G2C Services and B2C Integration
- Enterprise Integration
- Web Services and SSO
Taught by
EC-Council Educator Team
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera