This course covers the following topics:
An overview and history of access management
The protocols used in access management
The components of access control
Authentication methods
Centralized vs decentralized authorization systems
General authentication flows (proprietary, SAML2, OIDC)
Students who can benefit from this course:
System Integrators
System Consultants
System Architects
System Developers
System Administrators
Students should have successfully completed the following prior to taking this course:
To succeed fully in this course, students should:
Have a basic understanding of HTTP and web applications
Be comfortable on an online training environment
Must have computer with microphone and camera for training interaction