• EC-council logo

Cyber Security Foundations: Identity and Access Management

Explore key identity and access management concepts and learn how they can contribute to data security and cyber resilience.

  • Duration

    4 weeks
  • Weekly study

    2 hours
  • 100% online

    How it works
  • Included in an ExpertTrack

    Course 3 of 4
  • Get full ExpertTrack access

    $39/monthFind out more

Strengthen data security with identity and access management

This cyber security training course will introduce you to identity and access management.

Identity and access management is a key tool in data security. It describes the processes by which different users are granted certain data permissions and under what contexts.

This supports data security by ensuring that sensitive information can only be accessed by select users, at select times. Through identity and access management, the possibility of breaches and cyber attacks is greatly reduced.

Once cyber resilience is strengthened, you can focus data security processes on key moments of vulnerability. Identity and access management also serve to reduce the risk of human error, the greatest cause of data breaches.

This course will introduce you to key identity management models and tools, to help increase cyber resilience at your organization.

Discover key identity and access management concepts

In this cyber security training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management.

You will learn:

  • what identity and access management means and why it is important
  • the meaning and importance of the identity and management concepts of ‘identification’ and ‘authentication’
  • the meaning and importance of the identity and access management concept of ‘authorisation’
  • the role of organizational data security processes in identity and access management

This is a highly practical cyber security training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you learn at your organization.

Syllabus

  • Week 1

    What is Identity and Access Management?

    • Welcome to the Course

      In the this activity, you will be introduced to the course content and learn what to expect in the coming week.

    • What is Identity and Access Management?

      In this activity, you will be introduced to identity and access management and its importance in the field of cybersecurity.

    • Governance: Part 1

      In this activity, learn about the role of governance in IdAM.

    • Governance: Part 2

      In this activity, learn about culture and awareness, centralised versus distributed approaches, policies and procedures and some comparisons of these.

  • Week 2

    Understanding Identification and Authentication

    • Welcome to Week 2

      In this activity, you will learn what to expect in the coming week.

    • Key Concepts: Identification

      In these steps, learn more about the first key concept, ‘identification’.

    • Key Concepts: Authentication

      In these steps, learn about the second key concept, ‘Authentication’.

    • Biometric Authentication

      In these steps, learn about biometric authentication.

    • Summary

      You have reached the end of Week 2! In this activity, you will reflect and test yourself on what you have covered so far.

  • Week 3

    Understanding Authorization

    • Welcome to Week 3

      In these steps, you will learn what to expect in the coming week.

    • Key Concepts: Authorization Part 1

      In these steps, you will learn what to expect in the coming week.

    • Key Concepts: Authorization Part 2

      In this activity, you will learn about privileged access management, adaptive authorization and accounting considerations.

  • Week 4

    The Role of Organizational Processes in Identity and Access Management

    • Welcome to Week 4

      In these steps, you will learn what to expect in the coming week.

    • Organizational Processes: Part 1

      In this activity, learn about the role of organizational processes in identity and access management.

    • Organizational Processes: Part 2

      In this activity, learn about the role of organizational processes in identity and access management.

Prove you're job ready

Highlight the new, job-relevant skills you’ve gained and supplement existing qualifications with a hard-earned, industry-specific digital certificate – plus one for every course within your ExpertTrack.

  • Learn the latest in your chosen industry or subject.
  • Complete each course and pass assessments.
  • Receive certificates validated by the educating organisation.
  • Impress employers with learning outcomes you can add to your CV.
  • Make your career dreams a reality.

Download a PDF

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Describe identity and access management
  • Explain the importance of identity and access management
  • Identify important topics to consider in identity and access management
  • Explain how identification is used in identity and access management
  • Explain how authentication is used in identity and access management
  • Describe the different types of permissions used in authorization processes
  • Explain why organisational processes are important for identity and access management

Who is the course for?

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Who developed the course?

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

About this ExpertTrack

Discover why cyber security is important, and how to build organizational cyber resilience in these four cyber security courses.

Start learning today - free 7-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Do you know someone who'd love this course? Tell them about it...