Identity and Access Management (IAM)

This course is part of CISSP Certified Information Systems Security Professional Specialization

Instructor: Packt - Course Instructors

What you'll learn

  •   Manage authentication, authorization, and accounting processes within IAM systems to ensure secure access.
  •   Utilize protocols like OAuth, SAML, and RADIUS to enhance authentication security and prevent breaches.
  •   Perform identity lifecycle management tasks, including provisioning, deprovisioning, and access reviews, to maintain secure identities.
  •   Apply Federated Identity Management (FIM) to enable secure cross-domain access for users and systems.
  • Skills you'll gain

  •   Cryptographic Protocols
  •   Enterprise Security
  •   Security Controls
  •   Authorization (Computing)
  •   Identity and Access Management
  •   Authentications
  •   Security Assertion Markup Language (SAML)
  •   OAuth
  •   Role-Based Access Control (RBAC)
  •   User Provisioning
  •   Single Sign-On (SSO)
  •   User Accounts
  • There are 2 modules in this course

    Key IAM concepts like authentication, authorization, and accounting (AAA) are thoroughly discussed, emphasizing their importance in modern security architectures. You'll also learn how to manage sessions, perform identity registration, and implement Federated Identity Management (FIM) for cross-domain environments. The course also covers credential management techniques like password vaults, Single Sign-On (SSO), and Just-in-Time access, ensuring you can manage identities securely and efficiently. By the end of the course, you will be equipped to handle identity lifecycle processes such as provisioning, deprovisioning, account access reviews, and role definitions. Additionally, protocols like OAuth, OpenID, SAML, Kerberos, RADIUS, and TACACS+ are explained in depth, giving you a strong understanding of authentication systems. This course prepares you not only for the CISSP exam but also for the real-world challenges of managing identity and access in complex IT environments. This course is ideal for IT professionals, security managers, and network administrators preparing for CISSP certification or seeking to strengthen their expertise in Identity and Access Management (IAM). A basic understanding of information security and networking is recommended.

    Advanced Access Control Models and Authentication Protocols

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved