Iam | Identity & Access Management: A Vendor-Neutral Course

Posted By: ELK1nG

Iam | Identity & Access Management: A Vendor-Neutral Course
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 240.94 MB | Duration: 1h 55m

Master IAM fundamentals, essential tools, and real-world skills to start or advance your career in IT security.

What you'll learn

Understand Identity & Access Management (IAM) and its role in protecting organizations.

Explain IAM components such as authentication, authorization, and governance.

Analyze real-world IAM applications and how businesses secure access and manage identities.

Apply vendor-neutral IAM knowledge across different platforms, including cloud solutions.

Manage the identity lifecycle and access requests, from user creation to provisioning and retirement.

Implement identity governance and compliance, ensuring secure access and regulatory alignment.

Requirements

Basic IT and Cyber Security Knowledge (Not Essential)

Description

Step into the world of Identity & Access Management (IAM) and learn how it protects modern organizations from security threats. Whether you’re an IT professional looking to specialize in IAM, a beginner exploring cybersecurity, or someone transitioning into identity management, this vendor-neutral course will give you the skills you need to succeed.You’ll gain a clear, practical understanding of IAM fundamentals, including identity lifecycle management, access controls, authentication methods, Single Sign-On (SSO), Multi-Factor Authentication (MFA), and governance policies. Learn how organizations use IAM solutions like SailPoint, Okta, and Saviynt to secure user access, prevent breaches, and ensure regulatory compliance across industries.This course takes a vendor-neutral approach, ensuring you understand IAM concepts that apply across various platforms and environments. However, we also include a dedicated lecture comparing leading IAM tools, giving you insight into their differences and helping you choose the right solution for different business needs.Through real-world scenarios, you’ll see IAM in action, learning how businesses protect sensitive data, enforce security policies, automate user provisioning, and implement role-based access control (RBAC) effectively. You’ll also explore emerging trends in IAM, such as Zero Trust security and cloud-based identity solutions, making you industry-ready.By the end of this course, you’ll have a strong foundation in IAM concepts, allowing you to understand identity security, enforce access controls, and navigate IAM tools used in modern IT environments. Whether you're aiming to transition into IAM or strengthen your cybersecurity skills, this course will give you the knowledge and confidence to take the next step in your career.

Overview

Section 1: What is IAM?

Lecture 1 What is IAM?

Section 2: AAA (Authentication, Authorization, Accounting)

Lecture 2 AAA

Lecture 3 Zero Trust

Lecture 4 Least Privilege Access

Lecture 5 Continuous Monitoring and Auditing

Section 3: Basic Concepts of IAM

Lecture 6 Identity Lifecycle Management

Lecture 7 Introduction to Authentication Methods

Lecture 8 MFA & 2FA

Lecture 9 Dynamic MFA

Lecture 10 SSO

Lecture 11 CIAM VS Workforce Identity

Section 4: Access Control Types

Lecture 12 RBAC/ABAC

Lecture 13 PBAC

Lecture 14 DAC

Lecture 15 MAC

Section 5: Roles and Entitlements

Lecture 16 Roles and Entitlements

Section 6: Access Request System

Lecture 17 How ARS Works

Lecture 18 Types of Approval Workflows

Section 7: Segregation of Duties

Lecture 19 Segregation of Duties (SoDs)

Lecture 20 Understanding Risk in IAM

Section 8: Policies and Compliance with IAM

Lecture 21 Policies and Compliance with IAM

Lecture 22 Governance

Lecture 23 Compliance

Section 9: Certification

Lecture 24 Certifications

Lecture 25 Certification Campaigns

Lecture 26 Periodic Certification Campaigns

Lecture 27 Why Certifications are Crucial

Section 10: SaaS IAM Connectors

Lecture 28 SaaS IAM Connectors

Lecture 29 Moving to the Cloud (Hybrid IAM Setups)

Lecture 30 SailPoint/Saviynt SaaS Connectors

Section 11: The Full Identity Lifecycle of John

Lecture 31 The Full Identity Lifecycle of John

Section 12: IAM Tools and Solutions

Lecture 32 Overview of Popular IAM Tools

Lecture 33 SailPoint

Lecture 34 OKTA

Lecture 35 Saviynt

Lecture 36 Criteria for Selecting the Right IAM Solution

Section 13: Common Interview Questions

Lecture 37 Common Interview Questions

Cybersecurity beginners and enthusiasts,IT professionals wanting to learn more about IAM,People managing identities and access in security,Anyone looking to use IAM in real-world situations