Identity & Access Management-Learn LDAP, SAML, OAuth, OpenID
What you'll learn
- What is identity and access management?
- What is SSO and How it Works
- Open ID Connect
- What is SAML and How it Works
- Active Directory and LDAP
- What is OAuth
- Privilege Identity Management
- Identity Security
Requirements
- Basic IT Knowledge
Description
Identity management, also known as identity and access management, is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.
Importance of Identity Security :
Identity Security empowers workers with simple and secure access to business resources using single sign-on and adaptive multi-factor authentication. Passwordless authentication improves the strength of security and reduces the friction involved for end users.
Identity security describes the proactive approach to safely controlling user and system information that is used to authenticate and authorize user identities for access to secure resources. It is an essential aspect of the identity and access management (IAM) space and serves as the cornerstone for security in any organization.
In this Course you will learn about various fundamentals about Identity management. It is a foundational security component to help ensure users have the access they need, and that systems, data, and applications are inaccessible to unauthorized users.
What You will learn
What is Identity Management
Access Management
Authentication and Authorization Difference
Active Directory and LDAP Concept
Security Token Service Concept
Identity Security
What is IDP
Decision for Choosing Right IDP- Identity Provider
Identity Provider and Service Provider
Relation Between IDP Provider, Service Provider, Relying Party
What is Open ID Protocol
What is SAML Protocol
What is OAuth Protocol
OAuth Flow
What is AWS Cognito
Difference Between SAML vs OpenID vs OAuth
Role Based Access Control (RBAC)
Rule Based Access Control
Mandatory access control (MAC)
Discretionary access control (DAC).
Overview of the Common implementation process
User Access Review
System account access review
Provisioning and De provisioning
Take Action now with a 30-day money back guarantee.
Who this course is for:
- IAM Administrator
- Security Analyst
- IT Administrator
- Network Engineer
- Security Manager
- Security Analyst
- Security Consultant
- IT Managers
Instructor
Varinder has around 16 plus years of progressive, responsible and diversified experience in security, IT risk & compliance, project management, policies and procedures development.
Instructor has worked in various industries like telecom, pharma, oil &gas, Infra, banking, insurance.
Instructor hold various industry renowned certifications like CCSK, CCSP, CISM AWS-CA,Az-500, ISO 27001 LA and LI, CEH etc.