This course will teach you the foundational knowledge in zero trust architecture and identity and access management (IAM) including the key terminologies and concepts and examples of how these are implemented in the real-world.
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.