Zero Trust Identity and Access Management
by Phil Chapman
This course will teach you the foundational knowledge in zero trust architecture and identity and access management (IAM) including the key terminologies and concepts and examples of how these are implemented in the real-world.
What you'll learn
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.
About the author
Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also
the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces. He holds a variety of IT Technical and Security qualifications across many fields.
Phil spent 23 years in the Royal Air Force as an Intellige... morence Analyst working across the world in support of Signals and Human Intelligence operations. He worked mostly for GCHQ
agencies but also supported UK counter terrorism agencies and security services during his career. He also spent 5 years as a military trainer delivering courses in analysis, security and
intelligence gathering and reporting.
In 2007 Phil left the RAF and began a career as a training consultant, initially within a Microsoft Academy and then as a freelance consultant/trainer working across Europe in
support of multiple companies and organisations. He is now a permanent trainer and continues to deliver and develop training packages in support of the cyber security apprenticeship, law enforcement and commercial courses run in the UK and Europe. He is actively involved the Prepare, Protect and Prevent strategies working alongside UK law
enforcement agencies and advises as an SME to several UK based Cyber Crime Units.