In this detailed course on Identity and Access Management (IAM), you will explore the full spectrum of identity controls and management practices essential for today’s IT environments. Beginning with an overview of physical and logical access control methods, you’ll learn how to secure key organizational assets. The course progresses into the types of access controls, focusing on role-based and rule-based models, as well as advanced access control mechanisms like Attribute-Based Access Control (ABAC) and Risk-Based Access Control.
Identity and Access Management (IAM)
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Sponsored by Coursera Learning Team
Recommended experience
What you'll learn
Manage authentication, authorization, and accounting processes within IAM systems to ensure secure access.
Utilize protocols like OAuth, SAML, and RADIUS to enhance authentication security and prevent breaches.
Perform identity lifecycle management tasks, including provisioning, deprovisioning, and access reviews, to maintain secure identities.
Apply Federated Identity Management (FIM) to enable secure cross-domain access for users and systems.
Details to know
Add to your LinkedIn profile
1 assignment
October 2024
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
This module covers the fundamental concepts of controlling both physical and logical access in an organization, with a focus on different types of access controls and identity lifecycle management. Learners will explore how to manage user groups and roles, implement authentication, authorization, and accounting (AAA), and ensure secure session management. Additionally, key concepts around identity registration and proofing, as well as Federated Identity Management (FIM), will be covered. By the end of this module, learners will have a strong grasp of essential IAM components and how to control access to critical assets.
What's included
9 videos2 readings
This module focuses on advanced IAM concepts, including various access control models, provisioning and deprovisioning processes, and protocols for secure authentication. Learners will examine models like Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Attribute-Based Access Control (ABAC). The module will also cover key IAM protocols such as OAuth, OpenID, SAML, and Kerberos, which are vital for secure authentication and authorization across networks. Additionally, it will explore methods for access policy enforcement and account access review in complex IT environments.
What's included
11 videos1 reading1 assignment
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
Google Cloud
Tally Education and Distribution Services Private Limited
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy