PROGRAM SCHEDULE

Ref No: IT 110 Program Name: IT Systems: Identity and Access Management

Starts Ends Venue Fees Join Now
26 Feb 2024 01 Mar 2024 Bangalore, IND $ 5,250Registration Closed
27 May 2024 31 May 2024 Dubai, UAE $ 4,750Registration Closed
21 Oct 2024 25 Oct 2024 Paris, FR $ 5,750
24 Feb 2025 28 Feb 2025 Bangalore, IND $ 5,250
02 Jun 2025 06 Jun 2025 Dubai, UAE $ 4,750
20 Oct 2025 24 Oct 2025 Paris, FR $ 5,750

PROGRAM DETAILS



Introduction

In today’s rapidly evolving technological landscape, protecting digital identities and managing access controls has become a critical concern for organizations of all sizes. Identity and Access Management (IAM) has emerged as a vital component of IT systems management, and its proper implementation is essential to ensure the security, privacy, and compliance of organizations’ sensitive data.

This 5-day program on IAM is designed to provide attendees with a comprehensive understanding of IAM, its latest best practices, and technologies. The program will equip attendees with the skills necessary to design, implement, and manage IAM solutions in modern IT systems effectively. Attendees will learn the latest techniques and strategies for securing digital identities, controlling access to sensitive data, and managing user permissions.

The program will delve into the challenges and opportunities involved in integrating IAM solutions with other IT systems. It will explore the best practices for IAM implementation, governance, auditing, and risk management, along with future trends in IAM. Attendees will have the opportunity to participate actively, share their experiences and insights, and engage in peer-to-peer learning.

Learning Objectives

By the end of the program, participants will be equipped with the knowledge and skills required to

  • Understand the basics of IAM and its importance in modern IT systems
  • Design and implement IAM solutions for organizations
  • Implement access controls and user permissions in IAM solutions
  • Understand the latest IAM technologies and their applications
  • Manage IAM solutions effectively

 Who Should Attend

 The program is ideal for IT professionals, system administrators, security professionals, and anyone interested in learning about IAM and its implementation in IT systems. By the end of the program, attendees will be equipped with the knowledge and skills to design, implement, and manage effective IAM solutions that meet their organizations’ unique security and compliance requirements.

Training Methodology

 The program will use a dynamic combination of interactive sessions, hands-on exercises, and real-world case studies to provide attendees with a holistic view of IAM. Attendees will learn the critical concepts and principles of IAM, including access control models, user permission models, IAM architecture, and components. They will also gain a deep understanding of the latest IAM technologies, including single sign-on (SSO) solutions and multi-factor authentication (MFA) solutions.

 Program Content

 Day 1:

Session 1: Introduction to IAM

  • Overview of IAM and its importance in IT systems
  • Types of IAM solutions
  • IAM architecture and components

 Session 2: IAM Design and Implementation

  • IAM design principles
  • Designing IAM solutions for organizations
  • Implementing IAM solutions

 Day 2:

Session 3: Access Control in IAM

  • Access control models
  • Implementing access controls in IAM solutions
  • Best practices for access control in IAM solutions

 Session 4: User Permissions in IAM

  • User permission models
  • Implementing user permissions in IAM solutions
  • Best practices for user permissions in IAM solutions

 Day 3:

Session 5: IAM Technologies

  • Overview of IAM technologies
  • Single sign-on (SSO) solutions
  • Multi-factor authentication (MFA) solutions

 Session 6: IAM Integration

  • Integrating IAM solutions with other IT systems
  • Best practices for IAM integration
  • Common IAM integration challenges and solutions

 Day 4:

Session 7: IAM Management

  • IAM governance
  • IAM auditing and compliance
  • IAM risk management

 Session 8: IAM Case Study

  • Case study on IAM implementation in a real-world organization
  • Discussion and analysis of the case study

 Day 5:

Session 9: IAM Best Practices

  • Best practices for IAM implementation
  • Best practices for IAM management
  • Future trends in IAM

 Session 10: IAM Hands-On Exercise

  • Hands-on exercise on designing and implementing an IAM solution
  • Discussion and analysis of the hands-on exercise

 

 

Related Programs