IT17A08: IDENTITY AND ACCESS MANAGEMENT ESSENTIALS (SF)
IDENTITY AND ACCESS MANAGEMENT ESSENTIALS (SF)
Course Duration
Mode of Assessment
Students will be required to complete an assessment during class. There are 2 assessment modes in this module:
- Written Assessment
- Case Study
External Certification Exam
Official Cybertronium Examination
After students pass the assessment, they will receive a Certified Identity and Access Management Associate certificate from Cybertronium.
Who Should Attend
Anyone including early adopters of Identity and Access Management, IT Engineers and all asset stakeholders
What's In It for Me
- Learn about the need of securing identity systems
- Learn about the fundamentals of Identity and Access Management (IAM)
- Learn about the key concepts of IAM: Identity and Access Governance, Access provisioning, Access certifications, Identity Audit, Identity Proofing, Privileged Access Management, federated identity
- Learn the implementation architecture of Identity and Access Management
- Learn to build your own identity and access management strategy
Course Overview
This 2-day training on identity and access management will show learners on how to analyse the functions of ‘assets’ in an IAM system, as well as the impact of perimeter security management (in other words, securing the network’s servers, workstations, and databases with a variety of tools). Other important factors such as governance, organizational process, and standard approaches in IAM are also broken down for easier understanding.
Learners will understand the importance of Cloud services in providing IAM coverage, and the practical implementation of strategies and solutions that cover a variety of scenarios. This training course also explains the functions of software and infrastructure services in IAM management.
In Partnership with
Course Schedule
Next available schedule
Course Objectives
Upon completing the course, students will be able to:
- Understand the need of modern identity and access security perimeter
- Understand information security transformation
- Understand the Key Challenges and Strategic Opportunities
- Understand the need of securing identity systems
- Understand the Unified identity governance architecture and integration plans
- Understand the implementation architecture of Identity and Access Management
- Learn different Identity & Access Management Technologies and Tools
- Understand IAM cloud implementations
- Learn from the IAG, CIAM and Identity Proofing use cases
- Understand the Common Issues in Identity and Access Management
- Understand the challenges of identity and access in the cloud
- Learn to build your own identity and access management strategy
- Learn to Measure Identity and Access Management performance
Pre-requisites
There are no prerequisites for taking this course. However, basic understanding of cybersecurity will be helpful in the learning.
It is recommended that you have prior formal trainings in the following:
- Cybersecurity Awareness Programme
Course Outline
Module 1 : Introduction to Identity security
- Understand the Evolution of IT, Threats, and Identity Security
- Understand the Cyber kill chain and attack ecosystem
- Understand the need of modern identity and access security perimeter
- Understand information security transformation
- Understand the Key Challenges and Strategic Opportunities
- Understand the zero-trust principle and access control strategy
- Understand API Security, OAuth 2.0, OpenID Connect
- Identity security Trends and Challenges
- Understand the need of Multi Factor Authentication (MFA)
- Understand the need of securing identity systems
- Understand Privileged access is more than administrators
- Understand the basics of Account security and AD Attacks
Module 2 : Introduction to Identity and Access Management
- Introduction to Identity and Access Management
- Understand what is Identity Management
- Understand what is Identity Governance
- Understand what is Access Management
- Understand what are Directory Services
- Understand why IAM is important
- Key functions of IAM
- Understand the advantages of IAM
- Evolution of identity perimeter
- Identity and Access Management Use Cases
- Understand Consumer Identity and Access Management (CIAM)
- CIAM vs. IAM
- Understand the benefits of CIAM
- CIAM Use Cases
Module 3 : Identity and Access Governance
- Introduction to Identity and Access Governance (IAG)
- Understand the need of unified identity governance
- Understand the Unified identity governance architecture and approach
- IAG Use cases
- Understand on translating business needs to repeatable processes
- Understand Identity administration
- Understand users, roles and entity relationships
- Understand Access provisioning
- Understand Role life cycle management
- Understand Access certification and certification types
- Understand Identity Audit and Segregation of Duties
- Identity Management Reports
- Understand Centralized and Decentralized IAM Architecture
Module 4 : Key Identity and Access Management Concepts
- Understand the need of Identity Proofing
- Understand what is Identification Proofing and its types
- Understand Identity proofing process
- Understand Data-Centric Vs. Biometric Identity Proofing Approaches
- Understand what is biometric authentication and its traits
- Understand the benefits and risks of biometric authentication
- Biometric authentication use cases
- Understand Different types of Access Control models
- Understand what is Privileged Access Management (PAM)
- Understand what is user provisioning & Deprovisioning
- Understand the features of User Provisioning and Deprovisioning
- Understand What is Single Sign-On (SSO) and its types
- Understand what is federated identity
- Understand the technologies used in federated identity
- Understand the difference between SSO and federated identity
- Understand the benefits of federated identity
- Understand the Common Issues in Identity and Access Management
Module 5 :Cloud Services in Identity Management
- Introduction to Cloud services in IAM
- Understand the challenges of identity and access in the cloud
- Understand the Firebase backend-as-a-service
- IAM cloud implementations
Module 6 : Identity and Access Management Implementation
- Understand the implementation architecture of Identity and Access Management
- Learn to build your own identity and access management strategy
- Different Identity & Access Management Technologies and Tools
- Understand what is Kerberos and its authentication protocol
- Understand Kerberos protocol flow
- Understand the difference between Kerberos and Other Network Authentication Protocols
- Understand what is Active Directory and LDAP
- Understand what is Public Key Infrastructure and its components
- Understand eXtensible Access Control Markup Language and its architecture
- Learn to Measure Identity and Access Management performance
Certificate Obtained and Conferred by
- Certificate of Completion from NTUC LearningHub
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.
- Statement of Attainment (SOA) from SkillsFuture Singapore
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):
- External Certification
After completing this course and upon passing the official “Certified Identity and Access Management Associate” certification exam, candidates will receive Certified Identity and Access Management Associate certificate from Cybertronium. The certification is governed and maintained by Cybertronium.
Additional Details
Courseware / Lab:
- Learner’s Resources on Canvas
- Learner’s Guide for Identity and Access Management– E-copy
Medium of Instruction: English
Trainer: Trainee ratio is 1:25
Mode of Delivery: Virtual Live Class (VLC) via Zoom
As this is a government subsidised programme, the entire training programme will be video recorded for audit purposes by the relevant funding agency. To ascertain their presence, Trainees / Participants are required to
- Turn on web camera to show real-time video, as opposed to using a profile picture / video for the entirety of the training and assessment session.
- Ensure that their faces are fully visible (not just the forehead / eyebrows)
- Use their full name as per NRIC / Passport as their Screen Name on Zoom
Courseware: Canvas + Physical copy (for local use only)
Course Fees:
Course Fee and Government Subsidies |
||||||
|
Individual Sponsored |
Company Sponsored |
||||
|
Non-SME |
SME |
||||
Before GST |
With GST |
Before GST |
With GST |
Before GST |
With GST |
|
Full Course Fee
|
$1,400.00 |
$1,526.00 |
$1,400.00 |
$1,526.00 |
$1,400.00 |
$1,526.00 |
For Singapore Citizens aged 39 years and below
|
$420.00 |
$457.80 |
$420.00 |
$457.80 |
$140.00 |
$177.80 |
For Singapore Citizens aged 40 years and above |
$140.00 |
$177.80 |
$140.00 |
$177.80 |
$140.00 |
$177.80 |
Funding Eligibility Criteria:
Individual Sponsored Trainee |
Company Sponsored Trainee |
SkillsFuture Credit:
UTAP:
|
Absentee Payroll (AP) Funding:
|
Terms & Conditions apply. NTUC LearningHub reserve the right to make changes or improvements to any of the products described in this document without prior notice.
Prices are subject to other LHUB miscellaneous fees.
Batch ID | Course Period | Course Title | Funding Available |
Duration (Hours) |
Session (Hours) |
Venue | Available Seats |
Online Payment |
---|
What Others Also Enrolled In
CERTIFIED NETWORK DEFENDER (CND)(SF)(SYNCHRONOUS E-LEARNING)
View detailCYBERSECURITY AWARENESS PROGRAMME (SF) (SYNCHRONOUS E-LEARNING)
View detail