Introduction to Access Management
Summary
Access management is a critical component of cybersecurity and IT infrastructure. It involves the processes and technologies used to control who has access to organizational resources, ensuring that the right individuals have the appropriate level of access to data, systems, and applications. The course provides students with a high level understanding of Access Management and covers features, such as authentication, authorization, trust and security auditing for both on-premises and cloud-based systems.
Description
This course covers the following topics:
An overview and history of access management
The protocols used in access management
The components of access control
Authentication methods
Centralized vs decentralized authorization systems
General authentication flows (proprietary, SAML2, OIDC)
Prerequisites
Students should have successfully completed Identity Management Principles & Practices prior to taking this course.
To succeed fully in this course, students should:
Have a basic understanding of HTTP and web applications
Be comfortable on an online training environment
Must have computer with microphone and camera for training interaction
Who Can Benefit
System Integrators
System Consultants
System Architects
System Developers
System Administrators