Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

FutureLearn

Cyber Security Foundations: Identity and Access Management

EC-Council via FutureLearn

Overview

Strengthen data security with identity and access management

This cyber security training course will introduce you to identity and access management.

Identity and access management is a key tool in data security. It describes the processes by which different users are granted certain data permissions and under what contexts.

This supports data security by ensuring that sensitive information can only be accessed by select users, at select times. Through identity and access management, the possibility of breaches and cyber attacks is greatly reduced.

Once cyber resilience is strengthened, you can focus data security processes on key moments of vulnerability. Identity and access management also serve to reduce the risk of human error, the greatest cause of data breaches.

This course will introduce you to key identity management models and tools, to help increase cyber resilience at your organization.

Discover key identity and access management concepts

In this cyber security training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management.

You will learn:

  • what identity and access management means and why it is important
  • the meaning and importance of the identity and management concepts of ‘identification’ and ‘authentication’
  • the meaning and importance of the identity and access management concept of ‘authorisation’
  • the role of organizational data security processes in identity and access management

This is a highly practical cyber security training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you learn at your organization.

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Syllabus

  • What is Identity and Access Management?
    • Welcome to the Course
    • What is Identity and Access Management?
    • Governance: Part 1
    • Governance: Part 2
  • Understanding Identification and Authentication
    • Welcome to Week 2
    • Key Concepts: Identification
    • Key Concepts: Authentication
    • Biometric Authentication
    • Summary
  • Understanding Authorization
    • Welcome to Week 3
    • Key Concepts: Authorization Part 1
    • Key Concepts: Authorization Part 2
  • The Role of Organizational Processes in Identity and Access Management
    • Welcome to Week 4
    • Organizational Processes: Part 1
    • Organizational Processes: Part 2

Taught by

EC-Council Educator Team

Reviews

4.8 rating at FutureLearn based on 4 ratings

Start your review of Cyber Security Foundations: Identity and Access Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.