In today’s interconnected world, safeguarding sensitive data and ensuring proper access control are paramount. That is why Identity and Access Management (IAM) has become the primary cornerstone of enterprise cybersecurity.
Enhance your cybersecurity knowledge by mastering IAM’s most crucial and complex area: Identity and Access Governance (IAG), also called Identity Governance and Administration (IGA).
This comprehensive course delves deep into the vital realm of Identity and Access Governance (IAG). Explore the essentials of IAM and IAG, covering both organizational and technical aspects. Discover why this field of cybersecurity encompasses not only cybersecurity challenges but also user experience concepts.
Acquire expertise in the main capabilities of IAG solutions: identity classification and lifecycle management, integration with authoritative sources, access rights management and modeling (RBAC, ABAC…), access certification, segregation of duties, and more.
Immerse yourself in hands-on labs featuring SailPoint IIQ, the market-leading solution for IAG. Visualize and solidify your understanding of the theoretical concepts discussed in the course through immersive lab experiences. Concrete examples will be provided to enhance comprehension, ensuring a practical grasp of the material to finally gain practical experience through real-world scenarios and challenges faced by organizations.
Equip yourself with the knowledge and skills needed to navigate the complex realm of Identity and Access Governance confidently. Prepare for a rewarding career in securing digital identities and protecting valuable assets from cyber threats.
Identity Management
-
1Agenda
Brief agenda of the training session
-
2Course Introduction
-
3Meet your instructor
-
4What is Identity and Access Management (IAM) ? 1/3
Short definition and main differences between IAM and CIAM
-
5What is Identity and Access Management (IAM) ? 2/3
IAM pillars and solutions
-
6What is Identity and Access Management (IAM) ? 3/3
Example of a macro IAM architecture
-
7What is Identity and Access Governance (IAG) ?
-
8IAG main end users
-
9IAG main stakeholders
Main stakeholders in IAG processes and implementation projects
-
10Introduction to IAG Framework
IAG capabilities that support IAM processes
Rights Management
-
11Identity Management Capabilities
Main Identity management functionalities
-
12Identity Model
Identity objectifs and characteristics
-
13LAB SailPoint IIQ : Discovery of the Identity Model
-
14Identity Classification
-
15LAB SailPoint IIQ : Identity classification
-
16Authoritative sources (1/2)
-
17Authoritative sources (2/2)
-
18LAB SailPoint IIQ : Authoritative sources (1/2)
-
19LAB SailPoint IIQ : Authoritative sources (2/2)
-
20Identity Life-cycle
-
21Identity Life-cycle - Examples (1/2)
-
22Identity Life-cycle - Examples (2/2)
-
23LAB SailPoint IIQ : Identity Life-cycle
-
24Unique identifier (1/2)
-
25Unique identifier (2/2)
-
26Identity certification