• EC-council logo
New

Cyber Security Foundations: Identity and Access Management

Explore key identity and access management concepts and learn how they can contribute to data security and cyber resilience.

Cyber Security Foundations: Identity and Access Management
  • Duration4 weeks
  • Weekly study2 hours
  • 100% onlineTry this course for free
  • Included in an ExpertTrackCourse 3 of 4
  • Get full ExpertTrack access$39/month

Strengthen data security with identity and access management

This cyber security training course will introduce you to identity and access management.

Identity and access management is a key tool in data security. It describes the processes by which different users are granted certain data permissions and under what contexts.

This supports data security by ensuring that sensitive information can only be accessed by select users, at select times. Through identity and access management, the possibility of breaches and cyber attacks is greatly reduced.

Once cyber resilience is strengthened, you can focus data security processes on key moments of vulnerability. Identity and access management also serve to reduce the risk of human error, the greatest cause of data breaches.

This course will introduce you to key identity management models and tools, to help increase cyber resilience at your organization.

Discover key identity and access management concepts

In this cyber security training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management.

You will learn:

  • what identity and access management means and why it is important

  • the meaning and importance of the identity and management concepts of ‘identification’ and ‘authentication’

  • the meaning and importance of the identity and access management concept of ‘authorisation’

  • the role of organizational data security processes in identity and access management

This is a highly practical cyber security training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you learn at your organization.

Syllabus

  • Week 1

    What is Identity and Access Management?

    • Welcome to the Course

      In the this activity, you will be introduced to the course content and learn what to expect in the coming week.

    • What is Identity and Access Management?

      In this activity, you will be introduced to identity and access management and its importance in the field of cybersecurity.

    • Governance: Part 1

      In this activity, learn about the role of governance in IdAM.

    • Governance: Part 2

      In this activity, learn about culture and awareness, centralised versus distributed approaches, policies and procedures and some comparisons of these.

  • Week 2

    Understanding Identification and Authentication

    • Welcome to Week 2

      In this activity, you will learn what to expect in the coming week.

    • Key Concepts: Identification

      In these steps, learn more about the first key concept, ‘identification’.

    • Key Concepts: Authentication

      In these steps, learn about the second key concept, ‘Authentication’.

    • Biometric Authentication

      In these steps, learn about biometric authentication.

    • Summary

      You have reached the end of Week 2! In this activity, you will reflect and test yourself on what you have covered so far.

  • Week 3

    Understanding Authorization

    • Welcome to Week 3

      In these steps, you will learn what to expect in the coming week.

    • Key Concepts: Authorization Part 1

      In these steps, you will learn what to expect in the coming week.

    • Key Concepts: Authorization Part 2

      In this activity, you will learn about privileged access management, adaptive authorization and accounting considerations.

  • Week 4

    The Role of Organizational Processes in Identity and Access Management

    • Welcome to Week 4

      In these steps, you will learn what to expect in the coming week.

    • Organizational Processes: Part 1

      In this activity, learn about the role of organizational processes in identity and access management.

    • Organizational Processes: Part 2

      In this activity, learn about the role of organizational processes in identity and access management.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Describe identity and access management
  • Explain the importance of identity and access management
  • Identify important topics to consider in identity and access management
  • Explain how identification is used in identity and access management
  • Explain how authentication is used in identity and access management
  • Describe the different types of permissions used in authorization processes
  • Explain why organisational processes are important for identity and access management

Who is the course for?

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Who developed the course?

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

About this ExpertTrack

Discover why cyber security is important, and how to build organizational cyber resilience in these four cyber security courses.

Start learning today - free 7-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends