Course Outline
Identity and Access Management
AUTHOR NAME
SIMON SALMON
DURATION
- Sections: 9
- Skill level: All Levels
OVERVIEW
In an increasingly connected world, Identity and Access Management is critical to securing the access and availability of enterprise assets. Effective IAM ensures that the right people have access to the right assets.
This comprehensive course covers the key areas of IAM, including fundamental concepts, but also the technologies and the different approaches to implementing effective IAM across the enterprise, web services and government.
TARGET AUDIENCE
This course is designed to be accessible to all IT professionals involved with processes related to access management. The course is designed to build a theoretical, technical and practical knowledge of issues relating to identity and access management.
ABOUT THE AUTHOR
Simon has over 20 years of experience in IT Security. He has worked in a variety of positions across the government and private sectors as a consultant and senior manager and has a broad range of theoretical and practical experience relating to the implementation, management, and review of security.
He is passionate about sharing and developing skills in information Security, appearing twice as a keynote speaker twice at Information Security Europe and also leading and developing training in the field.
Simon holds various degrees alongside a range of certifications including CEH, CISSO, CSSLP, CRISIC, ISO27001, CBP, TOGAF, MCSE, IS7001.
He is a lead auditor and a Certified EC-Council Instructor.
SUMMARY OF CONTENTS
Course Overview
Section 1: Identity Access Management Concepts
Video 1.1: Introduction Part 1
Video 1.2: Introduction Part 2
Video 1.3: Introduction Part 3
Video 1.4: Introduction Part 4
Section 2: Governance
Video 2.1: Governance Part 1
Video 2.2: Governance Part 2
Video 2.3: Governance Part 3
Video 2.4: Governance Part 4
Video 2.5: Governance Part 5
Section 3: Key Identity and Access Management Concepts
Video 3.1: Key Concepts Part 1
Video 3.2: Key Concepts Part 2
Video 3.3: Key Concepts Part 3
Video 3.4: Key Concepts Part 4
Video 3.5: Key Concepts Part 5
Video 3.6: Key Concepts Part 6
Video 3.7: Key Concepts Part 7
Video 3.8: Key Concepts Part 8
Video 3.9: Key Concepts Part 9
Video 3.10: Key Concepts Part 10
Video 3.11: Key Concepts Part 11
Video 3.12: Key Concepts Part 12
Video 3.13: Key Concepts Part 13
Section 4: Organizational Processes
Video 4.1: Organizational Processes Part 1
Video 4.2: Organizational Processes Part 2
Video 4.3: Organizational Processes Part 3
Video 4.4: Organizational Processes Part 4
Video 4.5: Organizational Processes Part 5
Section 5: Identity Access Management Guidance and Standards
Video 5.1: Guidance Part 1
Video 5.2: Guidance Part 2
Video 5.3: Guidance Part 3
Video 5.4: Guidance Part 4
Section 6: Cloud
Video 6.1: Cloud Part 1
Video 6.2: Cloud Part 2
Video 6.3: Cloud Part 3
Video 6.4: Cloud Part 4
Video 6.5: Cloud Part 5
Section 7: Identity and Access Management Implementation
Video 7.1: Implementation Part 1
Video 7.2: Implementation Part 2
Video 7.3: Implementation Part 3
Video 7.4: Implementation Part 4
Section 8: Technologies
Video 8.1: Technologies Part 1
Video 8.2: Technologies Part 2
Video 8.3: Technologies Part 3
Video 8.4: Technologies Part 4
Video 8.5: Technologies Part 5
Video 8.6: Technologies Part 6
Video 8.7: Technologies Part 7
Video 8.8: Technologies Part 8
Section 9: Case Studies
Video 9.1: Case Studies Part 1
Video 9.2: Case Studies Part 2
Video 9.3: Case Studies Part 3
-
-
-
-
-
3.1 Key Concepts Part 1
-
3.2 Key Concepts Part 2
-
3.3 Key Concepts Part 3
-
3.4 Key Concepts Part 4
-
3.5 Key Concepts Part 5
-
3.6 Key Concepts Part 6
-
3.7 Key Concepts Part 7
-
3.8 Key Concepts Part 8
-
3.9 Key Concepts Part 9
-
3.10 Key Concepts Part 10
-
3.11 Key Concepts Part 11
-
3.12 Key Concepts Part 12
-
3.13 Key Concepts Part 13
-
-
-
-
-
-
-
-