We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Identity and Access Management (IAM) for CISSP®

Kevin Henry

This course will teach you the skills of managing access controls to information and information systems - a key part of the CISSP® examination.

Read more

This course will teach you the skills of managing access controls to information and information systems - a key part of the CISSP® examination.

This course will help you understand the principles of one of the most important areas of information security – the management of access to the assets of the organization – and assist you in preparing for the CISSP® examination. In this course, Identity and Access Management for the CISSP®, you’ll learn to design and manage an identity access program. First, you’ll explore identification and authentication. Next, you’ll discover authorization. Finally, you’ll learn how to establish accountability. When you’re finished with this course, you’ll have the skills and knowledge of Identity and Access Management needed for the CISSP® examination.

Enroll now

What's inside

Syllabus

Course Overview
Physical and Logical Access Controls
Identification and Authentication
Authorization and Access Permissions
Read more
Single Sign-on
Identity Management Lifecycle
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Ideal for those seeking CISSP® certification, as it covers one of its most important topics

Save this course

Save Identity and Access Management (IAM) for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Identity and Access Management (IAM) for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Identity and Access Management (IAM) for CISSP® will develop knowledge and skills that may be useful to these careers:
Identity and Access Management (IAM) Architect
Identity and Access Management (IAM) Architects design, implement, and manage IAM solutions for organizations. They ensure that the right people have the right access to the right resources at the right time. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as an IAM Architect and help organizations protect their data and assets.
Security Analyst
Security Analysts protect data and assets by detecting, mitigating, and responding to security incidents. They also advise organizations on how to improve their overall security posture. This course helps build a foundation in identity and access management (IAM), which is essential for securing an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any security team.
IT Security Manager
IT Security Managers oversee the development and implementation of IT security policies and procedures. They also manage security risks and ensure that the organization's IT infrastructure is protected from unauthorized access and data breaches. This course helps build a foundation in IAM, which is essential for protecting an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any IT security team.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are secure and compliant with regulations. They also provide recommendations for improving security and compliance. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as an IT Auditor and help organizations protect their data and assets.
Information Security Analyst
Information Security Analysts protect an organization's data and systems from unauthorized access and data breaches. They also investigate security incidents and provide recommendations for improving security. This course helps build a foundation in IAM, which is essential for protecting an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any information security team.
Database Security Analyst
Database Security Analysts protect databases from unauthorized access and data breaches. They also develop and implement database security policies and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Database Security Analyst and help organizations protect their data and assets.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also help organizations develop and implement security plans and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Consultant and help organizations protect their data and assets.
Security Engineer
Security Engineers design, implement, and maintain security systems and solutions. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Engineer and help organizations protect their data and assets.
Cloud Security Architect
Cloud Security Architects design, implement, and manage security for cloud computing environments. They ensure that cloud applications and data are protected from unauthorized access and data breaches. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Cloud Security Architect and help organizations protect their data and assets.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems and solutions. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Network Security Engineer and help organizations protect their data and assets.
Security Researcher
Security Researchers identify and analyze security vulnerabilities in software and systems. They also develop and implement security solutions. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Researcher and help organizations protect their data and assets.
Security Operations Center (SOC) Analyst
Security Operations Center (SOC) Analysts monitor security systems and events for suspicious activity. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a SOC Analyst and help organizations protect their data and assets.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. They also provide support to users and ensure that systems are running smoothly and securely. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Systems Administrator and help organizations protect their data and assets.
Software Security Engineer
Software Security Engineers design, implement, and test security features for software applications. They also investigate security vulnerabilities and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Software Security Engineer and help organizations protect their data and assets.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's security program. They also develop and implement security policies and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a CISO and help organizations protect their data and assets.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Identity and Access Management (IAM) for CISSP®.
This official study guide for the CISSP certification exam covers all of the topics covered in the course, including identity and access management.
Provides a comprehensive overview of identity and access management (IAM) for cloud services, covering topics such as authentication, authorization, and access control.
A classic in the field of computer security, this book covers a wide range of topics, including IAM. It is an excellent resource for anyone who wants to learn more about the theoretical foundations of IAM.
Provides practical advice on how to develop secure software. It includes a chapter on IAM, which covers topics such as authentication and authorization.
Provides a comprehensive overview of IAM, including topics such as identity federation, single sign-on, and access control. It good resource for anyone who wants to learn more about the technical aspects of IAM.
This document provides guidance on how to implement IAM in a secure and compliant manner. It must-read for anyone who is responsible for managing IAM in an organization.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Identity and Access Management (IAM) for CISSP®.
Identity and Access Management (IAM) for CISSP®
Most relevant
Exam Review Tips and Tricks for CISSP®
Most relevant
Security and Risk Management: Concepts and Principles for...
Most relevant
Access Controls for SSCP®
Most relevant
Exam Review and Tips for CISSP®
Most relevant
Certified Information Systems Security Professional...
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser