Zero Trust Identity and Access Management
Offered By: Pluralsight
Course Description
Overview
This course will teach you the foundational knowledge in zero trust architecture and identity and access management (IAM) including the key terminologies and concepts and examples of how these are implemented in the real-world.
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.
Syllabus
- Course Overview 1min
- Understanding the Concepts of Identity and Access Management in a Zero Trust Architecture 16mins
- Understanding MFA in Zero Trust Environments 23mins
- Understanding IAM Lifecycle Management 21mins
Taught by
Phil Chapman
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera