Identity and Access Management (IAM) Training Course
Identity and access management (IAM) is the process of ensuring that the right people and things have the right access to the right resources at the right time and for the right reasons. IAM involves authentication, authorization, and accountability of users, devices, applications, and data. IAM can help organizations improve their security, compliance, efficiency, and user experience.
This instructor-led, live training (online or onsite) is aimed at beginner-level to intermediate-level IT professionals and security analysts who wish to use IAM to manage and secure their digital identities and resources.
By the end of this training, participants will be able to:
- Use IAM concepts and terminology to describe and analyze different identity and access scenarios and challenges.
- Use IAM tools and technologies to implement and manage identity and access solutions for various platforms and environments.
- Use IAM standards and protocols to integrate and interoperate different identity and access systems and services.
- Use IAM best practices and frameworks to design and evaluate identity and access policies and processes.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
- Authentication
- Services Module Overview
- RADIUS
- TACACS
- Kerberos
- LDAP Secure
- LDAP SAML
- Module Review Authentication
- Authorization and Access Control Review Identification vs. Authentication vs. Authorization
- Identification Personal Identification
- Verification Card
- Username Authentication
- Tokens Common Access
- Card Multifactor
- Authentication
- TOTP HOTP CHAP PAP
- Single Sign-on Access Control
- Implicit Deny
- Trusted OS Authentication Factors
- Authorization
- Separation of Duties
- ACLs Mandatory Access Control Discretionary
- Access Control
- Role Based and Rule Based Access Control
- Time of Day Restrictions
- Federation Transitive Trust/Authentication
- Module Review Account Management
- Security Controls Module Overview User with Multiple Accounts
- Shared Accounts Account Policy
- Management Group Policy
- Password Complexity
- Expiration Recovery
- Disablement Lockout
- Password History
- Password Reuse
- Password Length
- Basic Concepts of AWS IAM
- What is the AWS IAM?
- Managing Users
- Managing Groups
- Managing Permissions
- Managing Roles
- Customization & Reports
- Login & Customization
- Getting Credentials Reports
- Improving security on AWS IAM
- Creating Keys with AWS KMS
- Setup Account Password Policy
- Enabling MFA on Accounts & Root
- Best Practices Using AWS IAM
- Generic Account Prohibition
- Group Based Privileges
- User Assigned Privileges
- User Access Reviews
- Continuous Monitoring
Requirements
- No specific requirements but familiarity with AWS and cloud platforms would be helpful.
Audience
- IT professionals
- Security analysts
- Anyone seeking to gain knowledge and skills in identity and access management
Open Training Courses require 5+ participants.
Identity and Access Management (IAM) Training Course - Booking
Identity and Access Management (IAM) Training Course - Enquiry
Identity and Access Management (IAM) - Consultancy Enquiry
Consultancy Enquiry
Testimonials (4)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.
Dennis Barela
Course - OpenLDAP Workshop
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
CAS for Administrators
7 HoursIn this instructor-led, live training Lithuania (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server.
By the end of this training, participants will be able to:
- Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
- Have the necessary practice to deploy and manage their own authentication server.
Draft Amendments to the eIDAS Regulation – eIDAS 2.0
21 HoursObjectives
- Familiarization with the proposed changes
- Gaining knowledge on how to prepare for changes
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led, live training in Lithuania (online or onsite), participants will learn how to create an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc.
- Use Indy to enable identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP for Linux Systems
7 HoursOpenLDAP is open source software for implementing the LDAP (Lightweight Directory Access Protocol), which allows management and access to information directories. Jest is a popular directory server that can be used to store and share data about users, groups, network resources and other objects on the network.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.
PKI: Implement and Manage
21 HoursThroughout the whole course in Lithuania, participants will gain in-depth knowledge on the following topics:
- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models