We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you the skills of managing access controls to information and information systems - a key part of the CISSP® examination.

Read more

This course will teach you the skills of managing access controls to information and information systems - a key part of the CISSP® examination.

This course will help you understand the principles of one of the most important areas of information security – the management of access to the assets of the organization – and assist you in preparing for the CISSP® examination. In this course, Identity and Access Management for the CISSP®, you’ll learn to design and manage an identity access program. First, you’ll explore identification and authentication. Next, you’ll discover authorization. Finally, you’ll learn how to establish accountability. When you’re finished with this course, you’ll have the skills and knowledge of Identity and Access Management needed for the CISSP® examination.

Enroll now

What's inside

Syllabus

Course Overview
Physical and Logical Access Controls
Identification and Authentication
Authorization and Access Permissions
Read more
Single Sign-on
Identity Management Lifecycle
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Ideal for those seeking CISSP® certification, as it covers one of its most important topics

Save this course

Save Identity and Access Management (IAM) for CISSP® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Identity and Access Management (IAM) for CISSP® with these activities:
Review Network Directory Services
Reviewing Network Directory Services will reinforce your understanding of the basics of how users and devices are managed, which will help you better understand the topics covered in this course.
Browse courses on Directory Services
Show steps
  • Review the concepts of directory services and their role in network management.
  • Review the different types of directory services, such as LDAP and Active Directory.
Organize and review course materials for better retention
Enhance your understanding and retention of course content by organizing and reviewing materials in a meaningful way.
Show steps
  • Gather and sort all course materials, including notes, assignments, quizzes, and exams
  • Create a structured system for organizing the materials, such as using folders or digital note-taking tools
  • Regularly review the organized materials to reinforce your understanding and identify areas for further study
Review principles of access control
Build a stronger grasp on essential access control principles, such as authentication, authorization, and accountability, to support your success in this course.
Browse courses on Access Control
Show steps
  • Review course materials on access control fundamentals
  • Explore online resources and articles on access control best practices
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Compile a glossary of key terms in identity and access management (IAM)
Enhance your understanding of key terminology used in the field of IAM by compiling a comprehensive glossary.
Show steps
  • Gather a list of essential terms related to IAM from course materials and online resources
  • Define each term clearly and concisely, ensuring accuracy and clarity
  • Organize the terms into a well-structured glossary for easy reference
Participate in a Study Group on Identity Management Lifecycle
Participating in a study group will allow you to discuss the concepts of Identity Management Lifecycle with your peers, which can help reinforce your understanding and identify areas where you need further clarification.
Show steps
  • Find a study group or create your own.
  • Meet with your study group regularly to discuss the material.
Practice Access Control List (ACL) Management
Practicing ACL Management will help you develop the skills necessary to manage access to resources effectively, which is a critical aspect of information security.
Show steps
  • Review the concepts of ACLs and how they are used to control access to resources.
  • Practice creating and managing ACLs on a test system.
Follow tutorials on single sign-on (SSO) implementation
Enhance your understanding and practical knowledge of single sign-on systems, which are widely used in modern IT environments.
Browse courses on Single Sign-On
Show steps
  • Identify reputable online tutorials or courses on SSO implementation
  • Follow the instructions and hands-on exercises provided in the tutorials
  • Test your understanding by implementing a basic SSO system in a simulated environment
Complete practice exercises on authorization and access permissions
Strengthen your ability to apply authorization and access permission concepts through practical problem-solving exercises.
Browse courses on Authorization
Show steps
  • Find online platforms or resources that offer practice exercises on authorization and access permissions
  • Attempt the exercises and check your answers against provided solutions or expert guidance
Follow a Tutorial on Single Sign-On (SSO) Implementation
Following a tutorial on SSO Implementation will provide you with hands-on experience in setting up and configuring SSO, which is an important aspect of identity and access management.
Browse courses on Single Sign-On (SSO)
Show steps
  • Find a reputable tutorial on SSO implementation.
  • Follow the steps in the tutorial to implement SSO on a test system.
Design and present an access control plan for a hypothetical scenario
Apply your knowledge to a real-world scenario by designing and presenting an access control plan, demonstrating your comprehension of the principles covered in the course.
Show steps
  • Identify a hypothetical scenario that requires the implementation of an access control plan
  • Research and gather information on best practices in access control planning
  • Design an access control plan that meets the specific requirements of the scenario
  • Prepare a presentation to clearly communicate your plan and its rationale
Engage in discussions on advanced topics in access control with peers
Connect with fellow learners to delve deeper into complex and emerging topics in access control, fostering knowledge exchange and critical thinking.
Show steps
  • Identify online forums, discussion groups, or virtual meetups focused on advanced access control topics
  • Participate actively in discussions, sharing your perspectives and engaging with others' ideas
  • Research and present on specialized topics to contribute to the collective knowledge of the group
Develop an Identity and Access Management Plan
Developing an Identity and Access Management Plan will help you apply the concepts you learn in this course to a real-world scenario, solidifying your understanding of the subject.
Browse courses on Access Management
Show steps
  • Gather requirements for the IAM plan.
  • Design the IAM plan, including policies and procedures for user management, authentication, and authorization.
  • Write the IAM plan document.
Implement an Identity and Access Management System
Implementing an Identity and Access Management System will provide you with valuable hands-on experience in designing, deploying, and managing an IAM solution, which will greatly enhance your understanding and skills in this domain.
Browse courses on Access Management
Show steps
  • Plan the IAM system, including the design, architecture, and implementation strategy.
  • Deploy the IAM system.
  • Manage the IAM system, including monitoring, maintenance, and troubleshooting.

Career center

Learners who complete Identity and Access Management (IAM) for CISSP® will develop knowledge and skills that may be useful to these careers:
Identity and Access Management (IAM) Architect
Identity and Access Management (IAM) Architects design, implement, and manage IAM solutions for organizations. They ensure that the right people have the right access to the right resources at the right time. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as an IAM Architect and help organizations protect their data and assets.
Security Analyst
Security Analysts protect data and assets by detecting, mitigating, and responding to security incidents. They also advise organizations on how to improve their overall security posture. This course helps build a foundation in identity and access management (IAM), which is essential for securing an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any security team.
IT Security Manager
IT Security Managers oversee the development and implementation of IT security policies and procedures. They also manage security risks and ensure that the organization's IT infrastructure is protected from unauthorized access and data breaches. This course helps build a foundation in IAM, which is essential for protecting an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any IT security team.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are secure and compliant with regulations. They also provide recommendations for improving security and compliance. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as an IT Auditor and help organizations protect their data and assets.
Information Security Analyst
Information Security Analysts protect an organization's data and systems from unauthorized access and data breaches. They also investigate security incidents and provide recommendations for improving security. This course helps build a foundation in IAM, which is essential for protecting an organization's IT infrastructure and data. By learning about identity and authentication, authorization, and access permissions, you can help protect organizations from unauthorized access and data breaches, making you a valuable asset to any information security team.
Database Security Analyst
Database Security Analysts protect databases from unauthorized access and data breaches. They also develop and implement database security policies and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Database Security Analyst and help organizations protect their data and assets.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also help organizations develop and implement security plans and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Consultant and help organizations protect their data and assets.
Security Engineer
Security Engineers design, implement, and maintain security systems and solutions. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Engineer and help organizations protect their data and assets.
Cloud Security Architect
Cloud Security Architects design, implement, and manage security for cloud computing environments. They ensure that cloud applications and data are protected from unauthorized access and data breaches. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Cloud Security Architect and help organizations protect their data and assets.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems and solutions. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Network Security Engineer and help organizations protect their data and assets.
Security Researcher
Security Researchers identify and analyze security vulnerabilities in software and systems. They also develop and implement security solutions. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Security Researcher and help organizations protect their data and assets.
Security Operations Center (SOC) Analyst
Security Operations Center (SOC) Analysts monitor security systems and events for suspicious activity. They also investigate security incidents and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a SOC Analyst and help organizations protect their data and assets.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. They also provide support to users and ensure that systems are running smoothly and securely. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Systems Administrator and help organizations protect their data and assets.
Software Security Engineer
Software Security Engineers design, implement, and test security features for software applications. They also investigate security vulnerabilities and provide recommendations for improving security. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a Software Security Engineer and help organizations protect their data and assets.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's security program. They also develop and implement security policies and procedures. This course provides a comprehensive overview of IAM, including identification and authentication, authorization, and access permissions. By completing this course, you will gain the skills and knowledge necessary to succeed as a CISO and help organizations protect their data and assets.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Identity and Access Management (IAM) for CISSP®.
This official study guide for the CISSP certification exam covers all of the topics covered in the course, including identity and access management.
Provides a comprehensive overview of identity and access management (IAM) for cloud services, covering topics such as authentication, authorization, and access control.
Provides a detailed overview of identity and access management for distributed systems.
A classic in the field of computer security, this book covers a wide range of topics, including IAM. It is an excellent resource for anyone who wants to learn more about the theoretical foundations of IAM.
Provides practical advice on how to develop secure software. It includes a chapter on IAM, which covers topics such as authentication and authorization.
Provides a comprehensive overview of IAM, including topics such as identity federation, single sign-on, and access control. It good resource for anyone who wants to learn more about the technical aspects of IAM.
This document provides guidance on how to implement IAM in a secure and compliant manner. It must-read for anyone who is responsible for managing IAM in an organization.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Identity and Access Management (IAM) for CISSP®.
Identity and Access Management (IAM) for CISSP®
Most relevant
Exam Review Tips and Tricks for CISSP®
Most relevant
Security and Risk Management: Concepts and Principles for...
Most relevant
Access Controls for SSCP®
Most relevant
Exam Review and Tips for CISSP®
Most relevant
Certified Information Systems Security Professional...
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser