Video description
In an increasingly connected world, Identity and Access Management is critical to securing the access and availability of enterprise assets. Effective IAM ensures that the right people have access to the right assets.
This comprehensive course covers the key areas of IAM, including fundamental concepts, but also the technologies and different approaches to implementing effective IAM across the enterprise, web services, and government.
Table of contents
- Chapter 1: Identity Access Management Concepts
- Chapter 2: Governance
- Chapter 3: Key Identity and Access Management Concepts
- Chapter 4: Organizational Processes
- Chapter 5: Identity Access Management Guidance and Standards
- Chapter 6: Cloud
- Chapter 7: Identity and Access Management Implementation
- Chapter 8: Technologies
- Chapter 9: Case Studies
Product information
- Title: Identity and Access Management
- Author(s):
- Release date: September 2019
- Publisher(s): EC-Council
- ISBN: None
You might also like
book
Identity and Access Management
provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM …
book
Access Control and Identity Management, 3rd Edition
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and …
book
Keycloak - Identity and Access Management for Modern Applications
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to …
book
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within …