Skip main navigation

Welcome to Week 1

Identity and access management is an important cybersecurity topic and central to every digital transaction that takes place between systems.
Over the next four weeks, you will learn about several important topics in identity and access management.

Identity and access management defined

Identity and access management is the combination of the systems, policies, processes and the technology that we have that helps us to manage and protect our assets or resources. The goal is to ensure that what we have in place enables the right individuals to access the right resources at the right time and for the right reasons. This means that identity and access management is at the center of IT security.

Course roadmap

This course will introduce you to identity and access management, its key concepts, and important considerations to apply to your specific context.

Week 1: What is identity and access management? Governance part 1 and part 2. Week 2: Key concepts identification. Key concepts authentication. Biometric authentication. Week 3: Key authorization part 1 and part 2. Week 4: Organizational processes part 1 and part 2.

Learning outcomes

By the end of this week, you will be able to:

  • describe identity and access management
  • explain the importance of identity and access management
  • explain the role of governance in identity and access management
  • identify important topics to consider in identity and access management

Working together

For this course, it is really important that you take the time to share comments and interact with others on the course. The educators from your videos will not be providing feedback as you move through the content, but you and other users should work together to discuss what you are learning and to support each other.

Next steps

When you are ready, you can mark this step as complete and move on to the next step ,‘Assessment in Identity and Access Management Part 1 ’, to begin.

DISCLAIMER: Please note that while the Certified Identity Access Professional (CIAP) logo appears on the video lessons in this course, you will not receive any certification from CIAP upon completion.

This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now