We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Identity and Access Management

The Big Picture

Phil Chapman

This course will teach you the foundational knowledge of Identity and Access Management (IAM) including the key terminologies, concepts, and examples of how these are implemented in the real world.

Read more

This course will teach you the foundational knowledge of Identity and Access Management (IAM) including the key terminologies, concepts, and examples of how these are implemented in the real world.

When establishing security accounts for users, or in order to make informed decisions on levels of access and user rights it's important to understand the concepts of authentication and authorization alongside the technologies available to implement controls. In this course, Identity and Access Management: The Big Picture, you’ll learn to understand the concepts of IAM. First, you’ll explore key terminologies and definitions of IAM. Next, you’ll discover how IAM is implemented within legacy and traditional infrastructure models. Finally, you’ll learn how to implement IAM into cloud and hybrid working environments. When you’re finished with this course, you’ll have the knowledge of Identity and Access Management needed to make informed decisions in the implementation of these technical controls.

Enroll now

What's inside

Syllabus

Course Overview
Understanding the Concepts of Identity and Access Management (IAM)
Putting IAM into Practice
Implementing IAM Solutions
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Focuses on the foundational knowledge of Identity and Access Management (IAM), making it well-suited for beginners
Provides industry-standard examples of how IAM is implemented in practice
Taught by Phil Chapman, a recognized expert in IAM
Covers key terminologies, concepts, and technologies for IAM implementation
Suitable for individuals responsible for establishing user accounts and making access control decisions

Save this course

Save Identity and Access Management: The Big Picture to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Identity and Access Management: The Big Picture. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Identity and Access Management: The Big Picture will develop knowledge and skills that may be useful to these careers:
Identity and Access Management (IAM) Specialist
An Identity and Access Management (IAM) Specialist is responsible for managing an organization's IAM systems. This role typically requires a bachelor's degree in computer science, information security, or a related field. This course may be helpful as it provides a foundation in IAM, which is the core focus of this role.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization from cybersecurity threats. In this role, you might review security measures, conduct vulnerability assessments, and develop security policies. Many organizations require Information Security Analysts to have a master's degree in computer science, information security, or a related field. This course may be helpful as it provides a foundation in Identity and Access Management (IAM), an important aspect of information security.
Security Engineer
A Security Engineer is responsible for implementing and maintaining security measures to protect an organization's data and systems. This role typically requires a bachelor's degree in computer science, information security, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of security engineering.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization from cybersecurity threats. This role typically requires a bachelor's degree in computer science, information security, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of cybersecurity.
Security Architect
A Security Architect designs and implements security measures to protect an organization's data and systems. This role often requires a master's degree in computer science, information security, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of security architecture.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's information security program. This role typically requires a master's degree in computer science, information security, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of information security.
IT Manager
An IT Manager is responsible for overseeing an organization's IT department. This role typically requires a bachelor's degree in computer science, information technology, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of IT management.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's databases. This role typically requires a bachelor's degree in computer science, information technology, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of database administration.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems and networks. This role typically requires a bachelor's degree in computer science, information technology, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of systems administration.
Cloud Architect
A Cloud Architect is responsible for designing and implementing cloud computing solutions for an organization. This role typically requires a bachelor's degree in computer science, information technology, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of cloud computing.
Security Consultant
A Security Consultant provides security advice and guidance to organizations. This role typically requires a bachelor's degree in computer science, information security, or a related field. This course may be helpful as it provides a foundation in IAM, which is a key aspect of security consulting.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization complies with laws and regulations. This role typically requires a bachelor's degree in business, finance, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of compliance management.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization. This role typically requires a bachelor's degree in business, finance, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of risk management.
Auditor
An Auditor is responsible for examining an organization's financial records and operations to ensure compliance with laws and regulations. This role typically requires a bachelor's degree in accounting, finance, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of compliance auditing.
DevSecOps Engineer
A DevSecOps Engineer is responsible for integrating security into the software development process. This role typically requires a bachelor's degree in computer science, information technology, or a related field. This course may be useful as it provides a foundation in IAM, which is a key aspect of DevSecOps.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Identity and Access Management: The Big Picture.
Provides a comprehensive overview of IAM, with a focus on enterprise environments. It good reference for those who want to learn more about IAM in large organizations.
Provides a basic overview of IAM. It good resource for those who are new to IAM.
Provides a detailed overview of security token services (STS). It valuable resource for anyone who wants to learn how to use STS to implement IAM solutions.
Provides a detailed overview of Oracle Identity and Access Management. It valuable resource for anyone who wants to learn how to use Oracle Identity and Access Management to implement IAM solutions.
Provides a detailed overview of IBM Security Verify Access. It valuable resource for anyone who wants to learn how to use IBM Security Verify Access to implement IAM solutions.
Provides a detailed overview of Azure Active Directory. It valuable resource for anyone who wants to learn how to use Azure Active Directory to implement IAM solutions.
Provides a detailed overview of Ping Identity Management. It valuable resource for anyone who wants to learn how to use Ping Identity Management to implement IAM solutions.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Identity and Access Management: The Big Picture.
Identity and Access Management (IAM) for CISSP®
Most relevant
Access Controls for SSCP®
Most relevant
Security Operations and Administration for SSCP®
Most relevant
Identity and Access Management on AWS: Users
Most relevant
AWS IAM (Identity and Access Management) - Deep Dive
Most relevant
Regulating Resource Usage Using Google Cloud IAM
Most relevant
AWS Identity and Access Management (IAM) Concepts
Most relevant
Access Controls
Most relevant
Authentication and Authorization with AWS Identity and...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser