Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

FutureLearn

Cyber Security Foundations: Reinforcing Identity and Access Management

EC-Council via FutureLearn

Overview

Develop your expertise in identity and access management

Identity and access management is the process through which access to restricted data is controlled. This helps data security by making sure only authorized users can access the data, and only in specific contexts.

This identity and access management course follows on from the previous course in this ExpertTrack. If you are new to identity and access management, you may benefit from completing the first course prior to this.

You’ll explore various real-life situations in which identity and access management challenges are raised. These will cover areas such as enterprise and B2C integration, using case studies to illustrate learning. You’ll also explore the use of identity and access management in the public sector, looking at G2C services and citizen ID.

You’ll further use case studies to see how the theory applies in practice. On completing the course, you’ll be able to apply what you learned to boost your organization’s data security and cyber resilience.

Engage with the evolving challenges of identity and access management

This cyber security training course covers general topics to advance your understanding of key identity and access management topics. These include:

  • single sign-on authentication
  • federation identity and management
  • cloud identity management models
  • AI in identity and access management
  • identity and access management implementation
  • identity and access management design architecture

Data security and cyber resilience requirements are in a state of constant evolution. The topics covered in this course will help you build up-to-date identity and access management processes. This will be a crucial part of your organization’s cybersecurity strategy.

This cybersecurity training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cybersecurity.

Syllabus

  • Standards and Best Practices for Identity and Access Management
    • Welcome to the Course
    • Guidance and Standards
    • Understanding Single Sign On (SSO) and Federation Identity
    • Summary
  • Cloud Management and Implementation Processes in Identity and Access Management
    • Welcome to Week 2
    • Cloud Services: Part 1
    • Cloud Services: Part 2
    • Implementation
    • Summary
  • Technologies in the Identity and Access Management Context
    • Welcome to Week 3
    • Introduction to Technology
    • Technologies: Part 1
    • Technologies: Part 2
    • Technologies: Part 3
    • Summary
  • Case Studies
    • Welcome to Week 4
    • Citizen Identification Proof
    • G2C Services and B2C Integration
    • Enterprise Integration
    • Web Services and SSO

Taught by

EC-Council Educator Team

Reviews

4 rating at FutureLearn based on 1 rating

Start your review of Cyber Security Foundations: Reinforcing Identity and Access Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.