Identity and Access Management (IAM)

Inquire now

Duration 3 days – 21 hrs

 

Overview

 

Identity and Access Management (IAM) is a critical discipline within cybersecurity and IT governance, ensuring that the right individuals have the right access to the right resources at the right time. This training course provides participants with a solid foundation in IAM concepts, technologies, standards, and best practices. It combines theoretical knowledge with practical exercises to help learners design, implement, and manage IAM solutions within enterprise and cloud environments.

 

Objectives

 

  • Understand the principles, components, and lifecycle of IAM.
  • Differentiate authentication, authorization, and accounting (AAA).
  • Apply IAM standards and protocols (LDAP, SAML, OAuth, OpenID Connect, Kerberos, RADIUS).
  • Design access control models such as RBAC, ABAC, and PBAC.
  • Manage identities, accounts, and entitlements in enterprise systems.
  • Implement IAM in cloud and hybrid environments (e.g., Azure AD, AWS IAM, Google IAM).
  • Develop policies and governance structures to enforce security and compliance.
  • Conduct IAM audits and ensure adherence to regulatory requirements.

 

Audience

  • IT Security Professionals
  • System & Network Administrators
  • Cloud Engineers & Architects
  • Risk & Compliance Officers
  • IT Managers & Decision Makers
  • Anyone involved in access control, identity management, or cybersecurity

 

Prerequisites

 

  • Basic knowledge of IT systems and networking
  • Familiarity with general cybersecurity concepts is helpful but not mandatory

 

Course Content

 

Module 1: Introduction to IAM

 

  • Importance of IAM in modern organizations
  • IAM architecture, components, and lifecycle
  • IAM challenges in enterprise and cloud

 

Module 2: Authentication & Authorization

 

  • Authentication methods: passwords, biometrics, MFA
  • Authorization principles and access controls
  • Single Sign-On (SSO) and federation

 

Module 3: IAM Standards and Protocols

 

  • LDAP and Active Directory
  • Kerberos authentication
  • RADIUS and TACACS+
  • SAML, OAuth 2.0, and OpenID Connect

 

Module 4: Access Control Models

 

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)

 

Module 5: Identity Lifecycle Management

 

  • Provisioning and de-provisioning users
  • Privileged Identity and Access Management (PIM/PAM)
  • Credential management and password policies

 

Module 6: IAM in the Cloud

 

  • IAM for AWS, Azure AD, and Google Cloud
  • Federation across cloud and on-prem environments
  • Cloud IAM security best practices

 

Module 7: IAM Governance, Risk, and Compliance

 

  • Policy and process development
  • IAM audit and reporting
  • Regulatory requirements (GDPR, HIPAA, ISO 27001, NIST)

 

Module 8: Hands-On Labs / Case Studies

 

  • Configuring IAM policies
  • Implementing MFA and SSO
  • Access review and role clean-up exercise
  • Real-world case study: IAM breach and remediation

 

Module 9: Best Practices & Future Trends

 

  • Zero Trust and IAM
  • Identity as a Service (IDaaS)
  • Emerging trends: AI-driven IAM, decentralized identity

 

Inquire now

Best selling courses

We use cookies on our website to personalize your experience by storing your preferences and recognizing repeat visits. By clicking “Accept”, you agree to the use of all cookies. You can also select “Cookie Settings” to adjust your preferences and provide more specific consent. Cookie Policy