Have a question?
Message sent Close
4.73 out of 5
4.73
13 reviews on Udemy

Identity and Access Governance (IAM/IAG/IGA)

Immersion in the most complex domain of Identity and Access Management : Identity and Access Governance (SailPoint IIQ)
Instructor:
Geoffroy Andrieu
68 students enrolled
English [Auto]
Identity and Access Governance (IAG) aka Identity Governance and Administration (IGA)
Identity and Access Management (IAM)
IAG concepts and best practises
IAG Framework
IAG features & capabilities
SailPoint basic functionnalities

In today’s interconnected world, safeguarding sensitive data and ensuring proper access control are paramount. That is why Identity and Access Management (IAM) has become the primary cornerstone of enterprise cybersecurity.

Enhance your cybersecurity knowledge by mastering IAM’s most crucial and complex area: Identity and Access Governance (IAG), also called Identity Governance and Administration (IGA).

This comprehensive course delves deep into the vital realm of Identity and Access Governance (IAG). Explore the essentials of IAM and IAG, covering both organizational and technical aspects. Discover why this field of cybersecurity encompasses not only cybersecurity challenges but also user experience concepts.

Acquire expertise in the main capabilities of IAG solutions: identity classification and lifecycle management, integration with authoritative sources, access rights management and modeling (RBAC, ABAC…), access certification, segregation of duties, and more.

Immerse yourself in hands-on labs featuring SailPoint IIQ, the market-leading solution for IAG. Visualize and solidify your understanding of the theoretical concepts discussed in the course through immersive lab experiences. Concrete examples will be provided to enhance comprehension, ensuring a practical grasp of the material to finally gain practical experience through real-world scenarios and challenges faced by organizations.

Equip yourself with the knowledge and skills needed to navigate the complex realm of Identity and Access Governance confidently. Prepare for a rewarding career in securing digital identities and protecting valuable assets from cyber threats.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.7
4.7 out of 5
13 Ratings

Detailed Rating

Stars 5
9
Stars 4
4
Stars 3
0
Stars 2
0
Stars 1
0
71692a0ddccf959ac57539a23431c59c

Includes

5 hours on-demand video
Certificate of Completion