NTUC LearningHub

Course Overview

 

This 2-day training on identity and access management will show learners on how to analyse the functions of ‘assets’ in an IAM system, as well as the impact of perimeter security management (in other words, securing the network’s servers, workstations, and databases with a variety of tools). Other important factors such as governance, organizational process, and standard approaches in IAM are also broken down for easier understanding.

 

 

Learners will understand the importance of Cloud services in providing IAM coverage, and the practical implementation of strategies and solutions that cover a variety of scenarios. This training course also explains the functions of software and infrastructure services in IAM management.

 

Course Objectives

 

Upon completing the course, students will be able to:

  • Understand the need of modern identity and access security perimeter
  • Understand information security transformation
  • Understand the Key Challenges and Strategic Opportunities
  • Understand the need of securing identity systems
  • Understand the Unified identity governance architecture and integration plans
  • Understand the implementation architecture of Identity and Access Management
  • Learn different Identity & Access Management Technologies and Tools
  • Understand IAM cloud implementations
  • Learn from the IAG, CIAM and Identity Proofing use cases
  • Understand the Common Issues in Identity and Access Management
  • Understand the challenges of identity and access in the cloud
  • Learn to build your own identity and access management strategy
  • Learn to Measure Identity and Access Management performance

 

Pre-requisites

 

There are no prerequisites for taking this course. However, basic understanding of cybersecurity will be helpful in the learning.

 

It is recommended that you have prior formal trainings in the following:

  • Cybersecurity Awareness Programme

 

Course Outline

 

Module 1 : Introduction to Identity security

  • Understand the Evolution of IT, Threats, and Identity Security
  • Understand the Cyber kill chain and attack ecosystem
  • Understand the need of modern identity and access security perimeter
  • Understand information security transformation
  • Understand the Key Challenges and Strategic Opportunities
  • Understand the zero-trust principle and access control strategy
  • Understand API Security, OAuth 2.0, OpenID Connect
  • Identity security Trends and Challenges
  • Understand the need of Multi Factor Authentication (MFA)
  • Understand the need of securing identity systems
  • Understand Privileged access is more than administrators
  • Understand the basics of Account security and AD Attacks

Module 2 : Introduction to Identity and Access Management

  • Introduction to Identity and Access Management
  • Understand what is Identity Management
  • Understand what is Identity Governance
  • Understand what is Access Management
  • Understand what are Directory Services
  • Understand why IAM is important
  • Key functions of IAM
  • Understand the advantages of IAM
  • Evolution of identity perimeter
  • Identity and Access Management Use Cases
  • Understand Consumer Identity and Access Management (CIAM)
  • CIAM vs. IAM
  • Understand the benefits of CIAM
  • CIAM Use Cases

 

Module 3 : Identity and Access Governance

  • Introduction to Identity and Access Governance (IAG)
  • Understand the need of unified identity governance
  • Understand the Unified identity governance architecture and approach
  • IAG Use cases
  • Understand on translating business needs to repeatable processes
  • Understand Identity administration
  • Understand users, roles and entity relationships
  • Understand Access provisioning
  • Understand Role life cycle management
  • Understand Access certification and certification types
  • Understand Identity Audit and Segregation of Duties
  • Identity Management Reports
  • Understand Centralized and Decentralized IAM Architecture

Module 4 :  Key Identity and Access Management Concepts

  • Understand the need of Identity Proofing
  • Understand what is Identification Proofing and its types
  • Understand Identity proofing process
  • Understand Data-Centric Vs. Biometric Identity Proofing Approaches
  • Understand what is biometric authentication and its traits
  • Understand the benefits and risks of biometric authentication
  • Biometric authentication use cases
  • Understand Different types of Access Control models
  • Understand what is Privileged Access Management (PAM)
  • Understand what is user provisioning & Deprovisioning
  • Understand the features of User Provisioning and Deprovisioning
  • Understand What is Single Sign-On (SSO) and its types
  • Understand what is federated identity
  • Understand the technologies used in federated identity
  • Understand the difference between SSO and federated identity
  • Understand the benefits of federated identity
  • Understand the Common Issues in Identity and Access Management

Module 5 :Cloud Services in Identity Management

  • Introduction to Cloud services in IAM
  • Understand the challenges of identity and access in the cloud
  • Understand the Firebase backend-as-a-service
  • IAM cloud implementations

Module 6 : Identity and Access Management Implementation

  • Understand the implementation architecture of Identity and Access Management
  • Learn to build your own identity and access management strategy
  • Different Identity & Access Management Technologies and Tools
  • Understand what is Kerberos and its authentication protocol
  • Understand Kerberos protocol flow
  • Understand the difference between Kerberos and Other Network Authentication Protocols
  • Understand what is Active Directory and LDAP
  • Understand what is Public Key Infrastructure and its components
  • Understand eXtensible Access Control Markup Language and its architecture
  • Learn to Measure Identity and Access Management performance

 

Certificate Obtained and Conferred by

 

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.

  • Statement of Attainment (SOA) from SkillsFuture Singapore

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):

  • External Certification

After completing this course and upon passing the official “Certified Identity and Access Management Associate” certification exam, candidates will receive Certified Identity and Access Management Associate certificate from Cybertronium. The certification is governed and maintained by Cybertronium.

Categories
More Information
  • NTUC LearningHub
Sponsored Content
Location
  • NTUC Trade Union House, 73 Bras Basah Road. S.189556, Singapore, Central Singapore Community Development Council 189556

  • No comments yet.
  • Add a review
    error: Content is protected !!