privileged access management training | Accredited Africa Training Institute for Capacity Development https://www.aaticd.co.za/tag/privileged-access-management-training/ Accredited Africa Training Institute for Capacity Development - Providing International Training Courses in South Africa Wed, 23 Oct 2019 07:11:54 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 https://i0.wp.com/www.aaticd.co.za/wp-content/uploads/2022/12/cropped-Accredited-Africa-Training-Institute-for-Capacity-Development-1.png?fit=32%2C32&ssl=1 privileged access management training | Accredited Africa Training Institute for Capacity Development https://www.aaticd.co.za/tag/privileged-access-management-training/ 32 32 121582049 IT Systems: Identity and Access Management https://www.aaticd.co.za/course/it-systems-identity-and-access-management/ Wed, 23 Oct 2019 07:11:54 +0000 http://aaticd.co.za/?post_type=course&p=1864 Why Attend We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks, and telecommunications, just to name a few. We are no […]

The post IT Systems: Identity and Access Management appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
Why Attend

We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks, and telecommunications, just to name a few. We are no longer only vulnerable to attacks against valuable enterprises’ digital content but also to life-threatening attacks, terrorist attacks, espionage attacks, etc. The need for providing identity assurance and stringent access control, as a result, is of utmost importance. This course covers the fundamental principles and architecture framework for an end-to-end IT identity and access management system. This includes identity assurance, authentication, authorization, accountability, Single Sign-On (SSO) and identity federation. It also discusses practical case studies such as e-passport, mobile banking, e-government services, EMV systems, and other selected cases.

Course Methodology

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises and role playing that allow all participants to use the knowledge they gained to demonstrate their skills in identity and access management.

Course Objectives

By the end of the course, participants will be able to:

  • Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options
  • Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate-based authentication, device authentication, etc)
  • Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies
  • Explain the most well-known access control mechanisms and the roles of OAuth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO
  • Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and border gate, mobile-banking, EMV scheme, and e-movement services)

Target Audience

This course has been designed for IT professionals such as IT Strategic Planners, Project Managers, Security Managers, Security Architects and Risk Managers.Although the course is technical in nature, complex concepts are discussed at an abstract level to fit the needs of participants from various technical backgrounds.

Target Competencies

  • Information security management
  • Impelementing public key infrastructure
  • Identification and authentication management
  • Identity Access Management (IAM)

The post IT Systems: Identity and Access Management appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
1864