Identity and Access Management Training

Level: Intermediate
Rating: 4.5/5 4.49/5 Based on 55 Reviews

This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. You will learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).

Key Features of this Identity Access Management Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Implement identity/access management to control access to IT resources
  • Build a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)
  • Streamline identity authentication for applications with claims
  • Seamlessly authenticate to the cloud with Federated Identity Management (FIM)
  • Synchronize identities among disparate authentication stores with Microsoft Identity Manager (MIM) 2016


CompTIA CPE 23 Credits

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • Earn 23 NASBA credits (live, in-class training only)
  • Earn 23 CompTIA CEUs
  • One-on-one after-course instructor coaching
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $2990 USD

Government $2659 USD




Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

Time Zone Legend:
Eastern Time Zone Central Time Zone
Mountain Time Zone Pacific Time Zone

Note: This course runs for 4 Days

  • Nov 16 - 19 9:00 AM - 4:30 PM EST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Jan 4 - 7 9:00 AM - 4:30 PM EST New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Apr 5 - 8 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Jul 5 - 8 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Important Identity Access Management Course Information

Identity Access Management Course Outline

  • Managing Identities in a Digital World

    Identity and its theft

    • Eliminating vulnerabilities in identification and authentication processes
    • Compromising multiple identities
    • Exploiting Object ID OID identities

    Ensuring strong authentication

    • Enforcing authentication with biometrics
    • Requiring multifactor authentication with smart cards
    • Migrating to virtual smart cards and Trusted Platform Module TPM

    Implementing Single Sign-On (SSO)

    • Interoperating via open industry standards, federated logon and claims
    • Applying Kerberos identities in a domain

    Surveying IdM solutions

    • Making identities portable with Secure Tokens
    • On-premises and cloud-based identity management
  • Synchronizing Identities

    Discovering identity stores

    • Exploring identities in Kerberos tickets and AD attributes
    • Identifying identities in SQL databases

    Demystifying MIM 2016

    • Importing identities from Connected Data Source CDS into Connector Space CS
    • Synchronizing identities into Metaverse MV
    • Managing identities and rules with the SharePoint MIM Portal
  • Implementing Identities in a PKI

    Inside PKI X.509 v3 certificates

    • Expiring identities with certificate lifetimes
    • Verifying identities with Subject Alternative Name
    • Binding identities to certificates

    Establishing trust via certificates

    • Validating trust with digital signatures
    • Creating entity trust by importing a root CA
    • Distributing trust to subordinate CAs
    • Flowing trust with domain Group Policy Object GPO

    Building an enterprise trust hierarchy

    • Publishing Certificate Revocation Lists (CRLs)
    • Increasing security with an offline root CA
    • Accessing directories with LDAP
    • Configuring Online Certificate Status Protocol OCSP

    Trusting an external identity provider

    • Forming a certificate chain
    • Locating the CA Trust Anchor
  • Expanding Trust with Federated Identity Management

    Federated management with Microsoft AD FS 3.0

    • Authenticating with a trusted Identity Provider IdP
    • Controlling access with claims
    • Verifying SAML tokens with Relaying Party RP
    • Striving for universally interoperable and portable identity

    Creating claims-aware applications

    • Building claims-aware applications with Windows Identity Foundation WIF
    • Abstracting SAML, WS-Trust and WS-Federation protocols

    Trusting external Identity Providers

    • Extending ADFS externally with Web Application Proxy WAP
    • Mapping external ADFS namespaces with DNS
  • Delivering Identities to the Cloud

    Windows Azure federation

    • Extending on-premises Active Directory (AD) to Azure AD
    • Implementing SSO in Azure for Office 365 and SaaS applications

    Amazon AWS federation

    • Authenticating with Amazon IAM roles
    • Microsoft federated log-in to Amazon services using SAML tokens
  • Mobile Identity Management with BYOD

    Enrolling mobile devices

    • Joining devices with Workplace Join
    • Enacting Device Registration Services DRS

    Planning a Federated Identity Roadmap

    • Achieving the FICAM IdM vision
    • Creating organizational identity management policy

Team Training

Identity Access Management Training FAQs

  • What is identity and access management?

    IAM refers to a framework of policies and technologies guaranteeing that the right people have the right user access to technology resources, often through Identity Management systems, or IAM systems. This course covers IAM best practices. 

  • Can I learn identity and access management online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français