Enterprises manage users and devices through a secured, functional, and reliable mechanism that controls access to data and information via applications and services in an enterprise’s computing environment. With skills gained in this course, you will be able to practice fundamental concepts of Identity and Access Management (IAM) and participate in the strategic, tactical, and operational level of IAM.
The practice of IAM, usually within an Information Security Management System (ISMS), is commonly designed and implemented based on the enterprise’s business needs and controls; the international security standard - ISO/IEC 27002 “Code of practice for information security controls”; and other suitable “270xx” families of ISO/IEC standards, industrial standards, frameworks, and regulatory requirements.
Graduates of this course will be able to describe the mechanisms required for IAM to manage and operate an Identity Lifecycle for all vetted identities and their access rights to enterprise assets.
Prior to enrolling in this course, it is recommended that you have a basic understanding of security concepts and access control mechanisms.