lesedev317
U P L O A D E R
Learn All About Identity And Access Management
Published 1/2025
Created by Hackademy _
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 51 Lectures ( 2h 16m ) | Size: 2.1 GB
A Complete Guide to Identity and Access Management
What you'll learn
Students will understand the basics of IAM, including authentication, authorization, and access control, as well as the difference between IAM, CIAM, and IDaaS.
They will learn about key IAM components like identity providers, directories, and access control models (RBAC, ABAC, PBAC), along with authentication methods.
Students will explore Single Sign-On (SSO), federated identity management, and Privileged Access Management (PAM) to secure user access across systems.
They will get hands-on experience with Keycloak and learn how to integrate several Identity and Access Management solutions
Requirements
Basic IT Knowledge
Description
Identity and Access Management (IAM) plays a crucial role in modern IT and cybersecurity, ensuring that only authorized individuals can access sensitive systems, applications, and data. This comprehensive course introduces you to the principles of IAM and provides hands-on experience with implementing secure and efficient access control solutions. You'll start by exploring foundational IAM concepts, such as user authentication, authorization, and access policies. The course delves into practical topics, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and federated identity management, equipping you with tools to enhance user experience without compromising security. Additionally, you'll learn to work with directory services like LDAP, configure user synchronization, and manage the full user lifecycle using Keycloak. This course also emphasizes security and compliance, teaching you how to enforce access governance policies, protect against identity-related threats, and align IAM practices with industry standards. Whether you're an IT professional, security specialist, or someone looking to advance their career in cybersecurity, this course offers the knowledge and skills to design, deploy, and manage robust IAM systems. By the end, you'll have a strong understanding of IAM tools and practices, ready to secure your organization's digital resources.I honestly believe that when you take this course you will learn what there is to know about identity and access management, and if you are already an it professional working on the domain you will learn new concepts and techniques.
Who this course is for
IT Professionals
Security Analysts
Developers
Homepage
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!