Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Identity & Access Management-Learn LDAP, SAML, OAuth, OpenID

Identity Access management and Identity Security (Updated-2021)
4.1
4.1/5
(383 reviews)
1,660 students
Created by

8.9

CourseMarks Score®

8.5

Freshness

8.6

Feedback

8.9

Content

Platform: Udemy
Video: 2h 44m
Language: English
Next start: On Demand

Table of contents

Description

Identity management, also known as identity and access management, is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.
Importance of Identity Security :
Identity Security empowers workers with simple and secure access to business resources using single sign-on and adaptive multi-factor authentication. Passwordless authentication improves the strength of security and reduces the friction involved for end users.
Identity security describes the proactive approach to safely controlling user and system information that is used to authenticate and authorize user identities for access to secure resources. It is an essential aspect of the identity and access management (IAM) space and serves as the cornerstone for security in any organization.
In this Course you will learn about various fundamentals about Identity management. It is a foundational security component to help ensure users have the access they need, and that systems, data, and applications are inaccessible to unauthorized users.
What You will learn
•What is Identity Management
•Access Management
•Authentication and Authorization Difference
•Active Directory and LDAP Concept
•Security Token Service Concept
•Identity Security
•What is IDP
•Decision for Choosing Right IDP- Identity Provider
•Identity Provider and Service Provider
•Relation Between IDP Provider, Service Provider, Relying Party
•What is Open ID Protocol
•What is SAML Protocol
•What is OAuth Protocol
•OAuth Flow
•What is AWS Cognito
•Difference Between SAML vs OpenID vs OAuth
•Role Based Access Control (RBAC)
•Rule Based Access Control
•Mandatory access control (MAC)
•Discretionary access control (DAC).
•Overview of the Common implementation process
•User Access Review
•System account access review
•Provisioning and De provisioning
Take Action now with a 30-day money back guarantee.

You will learn

✓ What is identity and access management?
✓ What is SSO and How it Works
✓ Open ID Connect
✓ What is SAML and How it Works
✓ Active Directory and LDAP
✓ What is OAuth
✓ Privilege Identity Management
✓ Identity Security

Requirements

• Basic IT Knowledge

This course is for

• IAM Administrator
• Security Analyst
• IT Administrator
• Network Engineer
• Security Manager
• Security Analyst
• Security Consultant
• IT Managers
Consultant in information security
Varinder has around 16 plus years of progressive, responsible and diversified experience in security, IT risk & compliance, project management, policies and procedures development.
Instructor has worked in various industries like telecom, pharma, oil &gas, Infra, banking, insurance.
Instructor hold various industry renowned certifications like CCSK, CCSP, CISM AWS-CA,Az-500, ISO 27001 LA and LI, CEH etc.



Browse all courses by on Coursemarks.
Platform: Udemy
Video: 2h 44m
Language: English
Next start: On Demand

Students are also interested in