Identity and Access Management Training

Course 2056 Advantage Plan Course

  • Duration: 4 days
  • Labs: Yes
  • Language: English
  • 23 CompTIA CEUs
  • Level: Intermediate

This course will immerse you in a modern Identity and Access Management (IAM) practical Hands-On experience, so you will strengthen your organization’s access to critical resources.  You will implement trust by building a Public Key Infrastructure (PKI) hierarchy and an on-premises Federated Single Sign On (SSO) system with Microsoft Identity Provider (IdP). You will learn the impact of Artificial Intelligence (AI) on IAM systems and on Zero Trust context. You will select appropriate authenticating environments, such as Workload and Workforce identities and Open Authorization (OAuth) to secure API access. You will also build an identity attribute mapping and synchronization system, with a central Share Point management solution. You will discover how Kubernetes implements IAM and federates to external APIs.

Identity and Access Management Training Delivery Methods

  • In-Person

  • Online

  • Upskill your whole team by bringing Private Team Training to your facility.

Identity and Access Management Training Course Information

  • In this course, you will:

    • Implement modern Identity and Access Management (IAM) solutions to secure access to data
    • Build a robust Public Key Infrastructure (PKI) to manage enterprise trust
    • Seamlessly implement Federation Identity Management (FIM) with ADFS
    • Extend Single Sign-On (SSO) with Zero Trust Architecture (ZTA)
    • Enhance Agentic AI and non-human actor authentication with certificates
    • Map the entity divide of Workload Identity vs Workforce Identity
    • Manage identities among multiple account stores with MIM 2016
    • Apply a managed identity to Bring Your Own Device (BYOD)
    • Formulate an IAM policy
  • Prerequisites

Identity Access Management Course Outline

Identity and its theft

  • Protecting Access to Data with Quad of IAM
  • Multi Factor Authentication (MFA) attacks
  • Secure alternatives to “Death of the Password”

Secure Identity Lifecycle Management

  • Migrating to Trusted Platform Module (TPM) hardware
  • "Joiner-Mover-Leaver"(JML) process

Implementing Single Sign-On (SSO)

  • Applying Kerberos identities in a domain
  • Interoperating via OIDC and SAML

Selecting Identity Trust Models

  • Centralized vs Federated
  • Zero Trust Architecture (ZTA)

Surveying the impact of Agentic AI on IAM

  • AI agent as a first-class identity and ephemeral credentials
  • Token Exchange delegation chain

Discovering identity stores

  • Exploring identities in Kerberos tickets and AD attributes
  • Identifying identities in SQL databases

Demystifying MIM 2016

  • Importing identities from Connected Data Source CDS into Connector Space CS
  • Synchronizing identities into Metaverse MV
  • Managing identities and rules with the SharePoint MIM Portal

Inside PKI X.509 v3 certificates

  • Expiring identities with certificate lifetimes
  • Verifying identities with Subject Alternative Name
  • Binding identities to certificates

Establishing trust via certificates

  • Validating trust with digital signatures
  • Creating entity trust by importing a root CA
  • Flowing trust with domain Group Policy Object GPO

Building an enterprise Subordinate CA

  • Publishing Certificate Revocation Lists (CRLs)
  • Accessing directories with LDAP
  • Configuring Online Certificate Status Protocol OCSP

Federating with Microsoft Active Directory Federation Services ADFS

  • Authenticating with a trusted Identity Provider IdP
  • Controlling access with claims
  • Verifying SAML tokens with Relaying Party RP

Creating claims-aware applications

  • Building claims-aware applications with Windows Identity Foundation WIF
  • Abstracting SAML, WS-Trust and WS-Federation protocols
  • Migrating to Open ID Connect OIDC and Java Web Tokens JWT

Trusting external Identity Providers

  • Extending ADFS externally with Web Application Proxy WAP
  • Mapping external ADFS namespaces with split DNS

Evolving Application Authentication

  • Customer Identity and Access Management (CIAM)
  • Decentralized authentication with Self-Sovereign Identity (SSI)
  • Zero Trust with Google Cloud Identity Aware Proxy IAP 

Workforce Identity vs Workload Identity

  • External long-term keyed authentication vs short-lived OAuthToken
  • Cloud workforce federation with Bring Your Own Identity BYOID
  • Kubernetes IAM mapping tokens with Workload Identity

Enrolling mobile devices

  • Joining devices with Workplace Join
  • Enacting Device Registration Services DRS

Planning a Federated Identity Roadmap

  • Achieving the FICAM IdM vision
  • Creating organizational identity management policy

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

IAM refers to a framework of policies and technologies guaranteeing that the right people have the right user access to technology resources, often through Identity Management systems, or IAM systems. This course covers IAM best practices.

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.