IT Systems: Identity and Access Management

Why Attend

We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks, and telecommunications, just to name a few. We are no longer only vulnerable to attacks against valuable enterprises’ digital content but also to life-threatening attacks, terrorist attacks, espionage attacks, etc. The need for providing identity assurance and stringent access control, as a result, is of utmost importance. This course covers the fundamental principles and architecture framework for an end-to-end IT identity and access management system. This includes identity assurance, authentication, authorization, accountability, Single Sign-On (SSO) and identity federation. It also discusses practical case studies such as e-passport, mobile banking, e-government services, EMV systems, and other selected cases.

Course Methodology

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises and role playing that allow all participants to use the knowledge they gained to demonstrate their skills in identity and access management.

Course Objectives

By the end of the course, participants will be able to:

  • Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options
  • Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate-based authentication, device authentication, etc)
  • Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies
  • Explain the most well-known access control mechanisms and the roles of OAuth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO
  • Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and border gate, mobile-banking, EMV scheme, and e-movement services)

Target Audience

This course has been designed for IT professionals such as IT Strategic Planners, Project Managers, Security Managers, Security Architects and Risk Managers.Although the course is technical in nature, complex concepts are discussed at an abstract level to fit the needs of participants from various technical backgrounds.

Target Competencies

  • Information security management
  • Impelementing public key infrastructure
  • Identification and authentication management
  • Identity Access Management (IAM)

Location:

South Africa

Training Dates:


Training Schedule
Duration
1 Week
2 Weeks
3 Weeks
Month
Option A
Option B
Option A
Option B
Option A
January
13 - 17 Jan
27 Jan - 31 Jan
6 - 17 Jan
20 Jan- 31 Jan
13 Jan - 31 Jan
February
10 - 14 Feb
24 Feb - 29 Feb
3 - 14 Feb
17 Feb - 29 Feb
10 Feb - 29 Feb
March
10 - 14 Mar
23 - 27 Mar
2 - 13 Mar
16 - 27 Mar
9 - 27 Mar
April
6 - 10 Apr
20 - 24 Apr
30 Mar - 10 Apr
13 - 24 Apr
6 - 24 Apr
May
6 - 10 May
27 -31 May
29 Apr - 10 May
20 - 31 May
13 - 31 May
June
8 - 12 Jun
22 - 26 Jun
1 -12 Jun
15 - 26 Jun
8 - 26 Jun
July
6 - 10 Jul
20 - 24 Jul
29 Jun - 10 Jul
13 - 24 Jul
6 - 24 Jul
August
10 - 14 Aug
24 - 28 Aug
3 - 14 Aug
17 - 28 Aug
10 - 28 Aug
September
7 - 11 Sep
21 - 25 Sep
31Aug - 10 Sep
14 - 25 Sep
7 - 25 Sep
October
5 - 9 Oct
19 - 23 Oct
28 Sep - 9 Oct
12 - 23 Oct
5 - 23 Oct
November
9 - 13 Nov
23 - 27 Nov
02 - 13 Nov
16 - 27 Nov
9 - 27 Nov
December
7 - 11 Dec
14 - 18 Dec
30 Nov - 11 Dec
07 - 18 Dec
30 Nov - 18 Dec


Course Duration:

Unit Standard:

NQF Level:

Number of Credits:


Course Fees


Note: Please fill in the online application form on the left or bottom if this page to receive a quotation with detailed pricing from AATICD.

How to Apply:

To Apply Simply Fill in the Online Enquiries / Applications form on the Right Sidebar or Bottom of this website https://www.aaticd.co.za

NB:

When filling the online application form; please take note of your desired Training Month, Duration in Weeks and Training Session. This will give us the exact dates you will be attending your classes.

Also note that Tuition Fees must be paid upfront on or before training start date. This is to ensure that all resources are made availabe for you before you start. You will not be allowed into training if fees are not paid and verified.

Also note that Tuition Fees Cancellations must be made 14 business working days before the starting date of training. This will allow us to do a 50% refund of the total amount paid. If cancellations are made thereafter note that no refund will be made to delegates.

Tuition Fees include teas and lunch as well as either a laptop or tablet which a delegate will take home free of charge.

Tuition Fee DOES NOT include Accommodation, Dinners and other Extra Curricular Activities or Incidentals. Delegates are expected to fund this on their own. AATICD will not be held accountable for any incidents to delegates.

In-House Trainings are also available for 3 or more delegates for any duration. Please consult with our Administration for such In-House training bookings.


Course Outline

  • Introduction and principles of information security:
    • Identity and access management (IAM) overview
    • Attributes of information security:
      • Confidentiality
      • Integrity
      • Availability
      • Non-repudiation
      • Accountability
      • Auditability
    • Symmetric and asymmetric cryptography
    • Hashing and digital signature
    • Key management
  • Public Key Infrastructure (PKI)
    • Architecture: certification and registration authority
    • Life cycle management
    • Types of certificates and usage patterns
      • Encryption
      • Digital signature
      • Client certificate
      • SSL server certificate
    • Attribute-based certificate
    • Case studies (e.g. email protection, mobile banking, and document signing)
  • Identification and authentication
    • Identification, verification and authentication overview
    • Mechanisms of identification and authentication
      • One time password
      • Biometric
      • Digital signature
      • Smartcard
      • Soft/hard tokens
    • Mobile device
    • Risk-based authentication
    • Step-up authentication
    • Single-sign on and federated single-sign-on
    • OATH, OpenID, BorwserID, and SAML
    • Architecture framework and industrial tools
    • Trusted computing role in identity assurance
    • Security risks associated with the discussed mechanisms
  • Access control
    • Principles of authorization
    • Access control schemes
    • OAuth protocol
    • Enterprise rights management and digital rights management
    • Privileged account management
    • Governance and compliance
  • IAM framework and use cases
    • IAM architecture framework
    • IAM echo system
    • IAM and cloud computing
    • Illustrative use cases
      • Border control
      • E-passport
      • National ID
      • E-banking
      • E-health system
      • EMV scheme