In this detailed course on Identity and Access Management (IAM), you will explore the full spectrum of identity controls and management practices essential for today’s IT environments. Beginning with an overview of physical and logical access control methods, you’ll learn how to secure key organizational assets. The course progresses into the types of access controls, focusing on role-based and rule-based models, as well as advanced access control mechanisms like Attribute-Based Access Control (ABAC) and Risk-Based Access Control.
Identity and Access Management (IAM)
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Manage authentication, authorization, and accounting processes within IAM systems to ensure secure access.
Utilize protocols like OAuth, SAML, and RADIUS to enhance authentication security and prevent breaches.
Perform identity lifecycle management tasks, including provisioning, deprovisioning, and access reviews, to maintain secure identities.
Apply Federated Identity Management (FIM) to enable secure cross-domain access for users and systems.
Skills you'll gain
Details to know
Add to your LinkedIn profile
October 2024
1 assignment
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
This module covers the fundamental concepts of controlling both physical and logical access in an organization, with a focus on different types of access controls and identity lifecycle management. Learners will explore how to manage user groups and roles, implement authentication, authorization, and accounting (AAA), and ensure secure session management. Additionally, key concepts around identity registration and proofing, as well as Federated Identity Management (FIM), will be covered. By the end of this module, learners will have a strong grasp of essential IAM components and how to control access to critical assets.
What's included
9 videos2 readings
This module focuses on advanced IAM concepts, including various access control models, provisioning and deprovisioning processes, and protocols for secure authentication. Learners will examine models like Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Attribute-Based Access Control (ABAC). The module will also cover key IAM protocols such as OAuth, OpenID, SAML, and Kerberos, which are vital for secure authentication and authorization across networks. Additionally, it will explore methods for access policy enforcement and account access review in complex IT environments.
What's included
11 videos1 reading1 assignment
Instructor
Offered by
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.