About the course
This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. You will learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).
Key Features of this Identity Access Management Training:
- After-course instructor coaching benefit
- Learning Tree end-of-course exam included
You Will Learn How To:
- Implement identity/access management to control access to IT resources
- Build a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)
- Streamline identity authentication for applications with claims
- Seamlessly authenticate to the cloud with Federated Identity Management (FIM)
- Synchronise identities amongst disparate authentication stores with Microsoft Identity Manager (MIM) 2016
Important Identity Access Management Course Information
Requirements
- Familiarity with security issues at the level of:
- Course 468, System and Network Security Introduction Training
- Experience with Windows operating system
Identity Access Management Course Outline
Managing Identities in a Digital World
Identity and its theft
- Eliminating vulnerabilities in identification and authentication processes
- Compromising multiple identities
- Exploiting Object ID OID identities
Ensuring strong authentication
- Enforcing authentication with biometrics
- Requiring multifactor authentication with smart cards
- Migrating to virtual smart cards and Trusted Platform Module TPM
Implementing Single Sign-On (SSO)
- Interoperating via open industry standards, federated logon and claims
- Applying Kerberos identities in a domain
Surveying IdM solutions
- Making identities portable with Secure Tokens
- On-premises and cloud-based identity management
Synchronising Identities
Discovering identity stores
- Exploring identities in Kerberos tickets and AD attributes
- Identifying identities in SQL databases
Demystifying MIM 2016
- Importing identities from Connected Data Source CDS into Connector Space CS
- Synchronising identities into Metaverse MV
- Managing identities and rules with the SharePoint MIM Portal
Implementing Identities in a PKI
Inside PKI X.509 v3 certificates
- Expiring identities with certificate lifetimes
- Verifying identities with Subject Alternative Name
- Binding identities to certificates
Establishing trust via certificates
- Validating trust with digital signatures
- Creating entity trust by importing a root CA
- Distributing trust to subordinate CAs
- Flowing trust with domain Group Policy Object GPO
Building an enterprise trust hierarchy
- Publishing Certificate Revocation Lists (CRLs)
- Increasing security with an offline root CA
- Accessing directories with LDAP
- Configuring Online Certificate Status Protocol OCSP
Trusting an external identity provider
- Forming a certificate chain
- Locating the CA Trust Anchor
Expanding Trust with Federated Identity Management
Federated management with Microsoft AD FS 3.0
- Authenticating with a trusted Identity Provider IdP
- Controlling access with claims
- Verifying SAML tokens with Relaying Party RP
- Striving for universally interoperable and portable identity
Creating claims-aware applications
- Building claims-aware applications with Windows Identity Foundation WIF
- Abstracting SAML, WS-Trust and WS-Federation protocols
Trusting external Identity Providers
- Extending ADFS externally with Web Application Proxy WAP
- Mapping external ADFS namespaces with DNS
Delivering Identities to the Cloud
Windows Azure federation
- Extending on-premises Active Directory (AD) to Azure AD
- Implementing SSO in Azure for Office 365 and SaaS applications
Amazon AWS federation
- Authenticating with Amazon IAM roles
- Microsoft federated log-in to Amazon services using SAML tokens
Mobile Identity Management with BYOD
Enrolling mobile devices
- Joining devices with Workplace Join
- Enacting Device Registration Services DRS
Planning a Federated Identity Roadmap
- Achieving the FICAM IdM vision
- Creating organisational identity management policy
Identity Access Management Training FAQs
What is identity and access management?
IAM refers to a framework of policies and technologies guaranteeing that the right people have the right access to technology resources.
Can I learn identity and access management online?
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.