Skip main navigation

Welcome to Week 1

Identity and access management is an important cybersecurity topic and central to every digital transaction that takes place between systems.
Welcome to Cyber Security Foundations: Reinforcing Identity and Access Management.

In the previous course, you were introduced to some key concepts (‘identification’, ‘authentication, and ‘authorization’), data governance, and some organizational processes that are important for the IdAM context.

For this course, you will learn about guidelines and standards, IdAM considerations, implementation, and technology. In the final week, you will get an opportunity to apply the knowledge you have learned from both identity and access management courses to four case studies.

Course roadmap

In this course, you can expect to learn about the following:

Week 1: Guidance and standards. Understanding single sing on and federation identity. Week 2: Cloud services part 1 and part 2. Implementation. Week 3: Introduction to technology. Technologies part 1, part 2 and part 3. Week 4: Citizen identification proof. G2C services and B2C integration. Enterprise integration. Webservices and SSO.

Learning outcomes

By the end of this week, you will be able to:

  • identify standards used in identity and access management
  • describe best practices within identity and access management
  • describe single sign-on and why it is used
  • describe federation identity management and why it is used

Working together

Remember, for this course, it is really important that you take the time to share comments and interact with others on the course. The educators from your videos will not be providing feedback as you move through the content, but you and other users should work together to discuss what you are learning and to support each other.

Next steps

When you are ready, you can mark this step as complete and move on to the next step ‘Assessment in Cyber Security Foundations: Reinforcing Identity and Access Management’ to begin.

Disclaimer: Please note that while the Certified Identity Access Professional (CIAP) logo appears on the video lessons in this course, you will not receive any certification from CIAP upon completion.

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now