Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Identity and Access Governance (IAM/IAG)

Posted By: lucky_aut
Identity and Access Governance (IAM/IAG)

Identity and Access Governance (IAM/IAG)
Published 8/2023
Duration: 3h19m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 980 MB
Genre: eLearning | Language: English

Immersion in the most complex domain of IAM : Identity and Access Governance

What you'll learn
What is Identity and Access Governance (IAG)
Identity and Access Management (IAM)
What is the difference between IAM and IAG
IAG concepts and best practises
IAG Framework
IAG features & capabilities
SailPoint basic functionnalities
Requirements
Basic IT and Cyber Security knowledge (optional)
Description
In today's interconnected world, safeguarding sensitive data and ensuring proper access control are paramount. That is why Identity and Access Management (IAM) has become the primary cornerstone of enterprise cybersecurity.
Enhance your cybersecurity knowledge by mastering IAM's most crucial and complex area: Identity and Access Governance (IAG).
This comprehensive course delves deep into the vital realm of Identity and Access Governance (IAG). Explore the essentials of IAM and IAG, covering both organizational and technical aspects. Discover why this field of cybersecurity encompasses not only cybersecurity challenges but also user experience concepts.
Acquire expertise in the main capabilities of IAG solutions: identity classification and lifecycle management, integration with authoritative sources, access rights management and modeling (RBAC, ABAC…), access certification, segregation of duties, and more.
Immerse yourself in hands-on labs featuring SailPoint IIQ, the market-leading solution for IAG. Visualize and solidify your understanding of the theoretical concepts discussed in the course through immersive lab experiences. Concrete examples will be provided to enhance comprehension, ensuring a practical grasp of the material to finally gain practical experience through real-world scenarios and challenges faced by organizations.
Equip yourself with the knowledge and skills needed to navigate the complex realm of Identity and Access Governance confidently. Prepare for a rewarding career in securing digital identities and protecting valuable assets from cyber threats.
Who this course is for:
IAM consultant / engineer
Cybersecurity consultant / engineer
IT professionals
IT and Cybersecurity students
Information Security Professional
CISO

More Info