Iam | Identity & Access Management: A Vendor-Neutral Course
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 240.94 MB | Duration: 1h 55m
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 240.94 MB | Duration: 1h 55m
Master IAM fundamentals, essential tools, and real-world skills to start or advance your career in IT security.
What you'll learn
Understand Identity & Access Management (IAM) and its role in protecting organizations.
Explain IAM components such as authentication, authorization, and governance.
Analyze real-world IAM applications and how businesses secure access and manage identities.
Apply vendor-neutral IAM knowledge across different platforms, including cloud solutions.
Manage the identity lifecycle and access requests, from user creation to provisioning and retirement.
Implement identity governance and compliance, ensuring secure access and regulatory alignment.
Requirements
Basic IT and Cyber Security Knowledge (Not Essential)
Description
Step into the world of Identity & Access Management (IAM) and learn how it protects modern organizations from security threats. Whether you’re an IT professional looking to specialize in IAM, a beginner exploring cybersecurity, or someone transitioning into identity management, this vendor-neutral course will give you the skills you need to succeed.You’ll gain a clear, practical understanding of IAM fundamentals, including identity lifecycle management, access controls, authentication methods, Single Sign-On (SSO), Multi-Factor Authentication (MFA), and governance policies. Learn how organizations use IAM solutions like SailPoint, Okta, and Saviynt to secure user access, prevent breaches, and ensure regulatory compliance across industries.This course takes a vendor-neutral approach, ensuring you understand IAM concepts that apply across various platforms and environments. However, we also include a dedicated lecture comparing leading IAM tools, giving you insight into their differences and helping you choose the right solution for different business needs.Through real-world scenarios, you’ll see IAM in action, learning how businesses protect sensitive data, enforce security policies, automate user provisioning, and implement role-based access control (RBAC) effectively. You’ll also explore emerging trends in IAM, such as Zero Trust security and cloud-based identity solutions, making you industry-ready.By the end of this course, you’ll have a strong foundation in IAM concepts, allowing you to understand identity security, enforce access controls, and navigate IAM tools used in modern IT environments. Whether you're aiming to transition into IAM or strengthen your cybersecurity skills, this course will give you the knowledge and confidence to take the next step in your career.
Overview
Section 1: What is IAM?
Lecture 1 What is IAM?
Section 2: AAA (Authentication, Authorization, Accounting)
Lecture 2 AAA
Lecture 3 Zero Trust
Lecture 4 Least Privilege Access
Lecture 5 Continuous Monitoring and Auditing
Section 3: Basic Concepts of IAM
Lecture 6 Identity Lifecycle Management
Lecture 7 Introduction to Authentication Methods
Lecture 8 MFA & 2FA
Lecture 9 Dynamic MFA
Lecture 10 SSO
Lecture 11 CIAM VS Workforce Identity
Section 4: Access Control Types
Lecture 12 RBAC/ABAC
Lecture 13 PBAC
Lecture 14 DAC
Lecture 15 MAC
Section 5: Roles and Entitlements
Lecture 16 Roles and Entitlements
Section 6: Access Request System
Lecture 17 How ARS Works
Lecture 18 Types of Approval Workflows
Section 7: Segregation of Duties
Lecture 19 Segregation of Duties (SoDs)
Lecture 20 Understanding Risk in IAM
Section 8: Policies and Compliance with IAM
Lecture 21 Policies and Compliance with IAM
Lecture 22 Governance
Lecture 23 Compliance
Section 9: Certification
Lecture 24 Certifications
Lecture 25 Certification Campaigns
Lecture 26 Periodic Certification Campaigns
Lecture 27 Why Certifications are Crucial
Section 10: SaaS IAM Connectors
Lecture 28 SaaS IAM Connectors
Lecture 29 Moving to the Cloud (Hybrid IAM Setups)
Lecture 30 SailPoint/Saviynt SaaS Connectors
Section 11: The Full Identity Lifecycle of John
Lecture 31 The Full Identity Lifecycle of John
Section 12: IAM Tools and Solutions
Lecture 32 Overview of Popular IAM Tools
Lecture 33 SailPoint
Lecture 34 OKTA
Lecture 35 Saviynt
Lecture 36 Criteria for Selecting the Right IAM Solution
Section 13: Common Interview Questions
Lecture 37 Common Interview Questions
Cybersecurity beginners and enthusiasts,IT professionals wanting to learn more about IAM,People managing identities and access in security,Anyone looking to use IAM in real-world situations