Duration 3 days – 21 hrs
Overview
Identity and Access Management (IAM) is a critical discipline within cybersecurity and IT governance, ensuring that the right individuals have the right access to the right resources at the right time. This training course provides participants with a solid foundation in IAM concepts, technologies, standards, and best practices. It combines theoretical knowledge with practical exercises to help learners design, implement, and manage IAM solutions within enterprise and cloud environments.
Objectives
- Understand the principles, components, and lifecycle of IAM.
- Differentiate authentication, authorization, and accounting (AAA).
- Apply IAM standards and protocols (LDAP, SAML, OAuth, OpenID Connect, Kerberos, RADIUS).
- Design access control models such as RBAC, ABAC, and PBAC.
- Manage identities, accounts, and entitlements in enterprise systems.
- Implement IAM in cloud and hybrid environments (e.g., Azure AD, AWS IAM, Google IAM).
- Develop policies and governance structures to enforce security and compliance.
- Conduct IAM audits and ensure adherence to regulatory requirements.
Audience
- IT Security Professionals
- System & Network Administrators
- Cloud Engineers & Architects
- Risk & Compliance Officers
- IT Managers & Decision Makers
- Anyone involved in access control, identity management, or cybersecurity
Prerequisites
- Basic knowledge of IT systems and networking
- Familiarity with general cybersecurity concepts is helpful but not mandatory
Course Content
Module 1: Introduction to IAM
- Importance of IAM in modern organizations
- IAM architecture, components, and lifecycle
- IAM challenges in enterprise and cloud
Module 2: Authentication & Authorization
- Authentication methods: passwords, biometrics, MFA
- Authorization principles and access controls
- Single Sign-On (SSO) and federation
Module 3: IAM Standards and Protocols
- LDAP and Active Directory
- Kerberos authentication
- RADIUS and TACACS+
- SAML, OAuth 2.0, and OpenID Connect
Module 4: Access Control Models
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
- Attribute-Based Access Control (ABAC)
Module 5: Identity Lifecycle Management
- Provisioning and de-provisioning users
- Privileged Identity and Access Management (PIM/PAM)
- Credential management and password policies
Module 6: IAM in the Cloud
- IAM for AWS, Azure AD, and Google Cloud
- Federation across cloud and on-prem environments
- Cloud IAM security best practices
Module 7: IAM Governance, Risk, and Compliance
- Policy and process development
- IAM audit and reporting
- Regulatory requirements (GDPR, HIPAA, ISO 27001, NIST)
Module 8: Hands-On Labs / Case Studies
- Configuring IAM policies
- Implementing MFA and SSO
- Access review and role clean-up exercise
- Real-world case study: IAM breach and remediation
Module 9: Best Practices & Future Trends
- Zero Trust and IAM
- Identity as a Service (IDaaS)
- Emerging trends: AI-driven IAM, decentralized identity

