Access management is a critical component of cybersecurity and IT infrastructure. It involves the processes and technologies used to control who has access to organizational resources, ensuring that the right individuals have the appropriate level of access to data, systems, and applications. The course provides students with a high level understanding of Access Management and covers features, such as authentication, authorization, trust and security auditing for both on-premises and cloud-based systems.
This course covers the following topics: An overview and history of access management, The protocols used in access management, The components of access control, Authentication methods, Centralized vs decentralized authorization systems, General authentication flows (proprietary, SAML2, OIDC).
Students should have successfully completed Identity Management Principles & Practices prior to taking this course. To succeed fully in this course, students should: Have a basic understanding of HTTP and web applications, Be comfortable on an online training environment, Must have computer with microphone and camera for training interaction.
System Integrators, System Consultants, System Architects, System Developers, System Administrators.