This learner has completed ID verification. Find out more.
Certificate of Achievement
has completed the following course:
Cyber Security Foundations: Identity and Access Management
In this cybersecurity training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management. This is a highly practical cybersecurity training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you will learn at your organization.
4 weeks, 2 hours per week
Jay Bavisi
President
EC-Council
Transcript
Learning outcomes
- Describe identity and access management
- Explain the importance of identity and access management
- Identify important topics to consider in identity and access management
- Explain how identification is used in identity and access management
- Explain how authentication is used in identity and access management
- Describe the different types of permissions used in authorization processes
- Explain why organisational processes are important for identity and access management
Syllabus
- Week 1: What is identity and access management?
- Week 2: Understanding key concepts: identification and authentication
- Week 3: Understanding key concepts: authorization
- Week 4: The role of organisational processes in identity and access management
Issued on 16th January 2021
The person named on this certificate has completed the activities in the transcript above. For more information about Certificates of Achievement and the effort required to become eligible, visit futurelearn.com/proof-of-learning/certificate-of-achievement.
This certificate represents proof of learning. It is not a formal qualification, degree, or part of a degree.