Skip to main content

Identity and Access Management Training

Code: 2056 Category: Tag:

This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. You will learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).

Familiarity with security issues at the level of:
Course 468, System and Network Security Training
Experience with Windows operating system

Identity and Access Management Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Identity and Access Management Training Course Benefits
Implement identity/access management to control access to IT resourcesBuild a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)Streamline identity authentication for applications with claimsSeamlessly authenticate to the cloud with Federated Identity Management (FIM)Synchronize identities among disparate authentication stores with Microsoft Identity Manager (MIM) 2016
Identity Access Management Course Outline
Managing Identities in a Digital World

Identity and its theft

Eliminating vulnerabilities in identification and authentication processes
Compromising multiple identities
Exploiting Object ID OID identities

Ensuring strong authentication

Enforcing authentication with biometrics
Requiring multifactor authentication with smart cards
Migrating to virtual smart cards and Trusted Platform Module TPM

Implementing Single Sign-On (SSO)

Interoperating via open industry standards, federated logon and claims
Applying Kerberos identities in a domain

Surveying IdM solutions

Making identities portable with Secure Tokens
On-premises and cloud-based identity management
Synchronizing Identities
Implementing Identities in a PKI
Expanding Trust with Federated Identity Management
Delivering Identities to the Cloud
Mobile Identity Management with BYOD

Request Quotes

Register now
CAPTCHA image

Please type the characters This helps us prevent spam, thank you.

Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW v1.0) Training

Implementing and Operating Cisco Security Core Technologies (SCOR v1.0) Training

Implementing SharePoint Records Management Training

Certified Information Privacy Professional (CIPP/US)

VMware vSphere V7 Training

Red Hat System Administration II Training with RHCSA Exam (RH135)

Microsoft Azure IoT Developer Training (AZ-220)

Cisco Stealthwatch for System Administrators (SSA)

FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512)

BOW310 – SAP BusinessObjects Web Intelligence Training: Report Design I

arالعربية