This course is designed to equip you with the essential knowledge and skills to master complex IAM practices and strategies. We will cover various advanced concepts, frameworks, and technologies that are pivotal in securing and managing digital identities within an organization.
Students will learn essential IAM concepts and terminology, and understand the four pillars of IAM—Authentication, Authorization, User Management, and Central User Repository—and their significance. This course studies the comprehensive framework of policies, processes, and technologies that underpin effective IAM systems. Through a detailed examination of the IAM lifecycle, from identity provisioning to de-provisioning, students will gain a robust understanding of the principles and benefits of Zero Trust Architecture.
Our Cybersecurity Specialization courses follow the 9 pillars of Cybersecurity, providing key skills necessary to be successful as a cybersecurity professional.
Who Should Attend?
- Experienced IT Security Professionals (Min. 1+ years exp.)
- IAM Administrators
- System and Network Administrators
- IT Managers and Directors
- DevOps Engineers
- Compliance and Risk Management Professionals
- Software Developers and Architects
- Consultants and Advisors