-
Course
- Security
Zero Trust Identity and Access Management
This course will teach you the foundational knowledge in zero trust architecture and identity and access management (IAM) including the key terminologies and concepts and examples of how these are implemented in the real-world.
What you'll learn
When establishing security accounts for users or in order to make informed decisions on levels of access and user rights, it is important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Zero Trust Identity and Access Management, you’ll learn the concepts of ZTA and IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented into infrastructure models utilizing various authentication factors. Finally, you’ll learn how to implement IAM into zero trust environments and how digital identities may be managed. When you’re finished with this course, you’ll have the knowledge of identity and access management needed to making informed decisions in the implementation of these technical controls.
Table of contents
About the author
Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces.
More Courses by Phil