We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you the heartbeat of information security - Identity and Access Management - needed for the Certified Information Systems Security Professional exam.

Read more

This course will teach you the heartbeat of information security - Identity and Access Management - needed for the Certified Information Systems Security Professional exam.

The argument can be made that identity and access management is the center point of any information security program. Security is dependent on who can get access to our systems, networks and data, and what can they do with that access. In this course, Identity and Access Management (IAM) for CISSP®, you’ll learn to design and implement both physical and logical access controls. First, you’ll explore identity-based access controls. Next, you’ll discover how to implement authorization mechanisms. Finally, you’ll learn how to manage the identity management lifecycle. When you’re finished with this course, you’ll have the skills and knowledge of Identity and Access Management needed for the Certified Information Systems Security Professional exam.

Enroll now

What's inside

Syllabus

Course Overview
Identity-based Access Controls
Implementing Access Controls
Managing the Identity Management Lifecycle
Read more
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills and knowledge needed to pass the Certified Information Systems Security Professional exam
Taught by recognized instructor Kevin Henry
Covers domain like identity-based access controls
Covers domain like implementing access controls
Covers domain like managing the identity management lifecycle

Save this course

Save Identity and Access Management (IAM) for CISSP® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Identity and Access Management (IAM) for CISSP® with these activities:
Compile and organize your notes, assignments, and study materials
Stay organized and improve your retention by compiling your learning resources.
Show steps
  • Gather all your notes, assignments, and study materials from the course
  • Create a system for organizing your materials, such as folders or a digital notebook
  • Review your materials regularly to reinforce your learning
Work through an Identity and Access Management tutorial
Gain a practical understanding of Identity and Access Management through a guided walkthrough.
Browse courses on IAM
Show steps
  • Find a tutorial that covers the concepts of Identity and Access Management
  • Follow the steps in the tutorial and implement the concepts
  • Test your understanding by completing the exercises provided in the tutorial
Review CISSP Official (ISC)² Study Guide
Supplement the course materials with a trusted resource for Identity and Access Management and CISSP exam preparation.
Show steps
  • Read the chapters relevant to Identity and Access Management
  • Take notes and highlight key concepts
  • Complete the practice questions and review explanations
Four other activities
Expand to see all activities and additional details
Show all seven activities
Engage in a study group with peers
Enhance your understanding by discussing and learning with peers.
Browse courses on IAM
Show steps
  • Form a study group with other students taking the course
  • Meet regularly to discuss the course material, ask questions, and share insights
  • Collaborate on projects and assignments related to Identity and Access Management
Create a visual representation of an Identity and Access Management system
Solidify your understanding of Identity and Access Management by creating a visual representation.
Browse courses on IAM
Show steps
  • Choose a visual representation method, such as a diagram, flowchart, or infographic
  • Identify the key components of an Identity and Access Management system
  • Design and create the visual representation, ensuring clarity and accuracy
  • Share your visual representation with others for feedback and discussion
Try out Identity and Access Management concepts with a practice exam
Practice implementing Identity and Access Management concepts through a certification exam simulation.
Browse courses on IAM
Show steps
  • Review the exam syllabus and identify the topics covered
  • Practice implementing Identity and Access Management concepts using the resources provided in the course
  • Take the practice exam under timed conditions
  • Review your results and identify areas for improvement
Volunteer at an organization that implements Identity and Access Management solutions
Gain hands-on experience with Identity and Access Management in a real-world setting.
Browse courses on IAM
Show steps
  • Research organizations that implement Identity and Access Management solutions
  • Identify volunteer opportunities and apply for a position
  • Participate in projects and tasks related to Identity and Access Management under the guidance of experienced professionals
  • Network with industry experts and learn from their experiences

Career center

Learners who complete Identity and Access Management (IAM) for CISSP® will develop knowledge and skills that may be useful to these careers:
Security Architect
As a Security Architect, you'll design and implement security solutions to protect an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course in Identity and Access Management (IAM) is a must-have for you as it will teach you the principles and practices of IAM and how to apply them to protect an organization's information systems.
Information Security Engineer
Information Security Engineers design, implement, and maintain security systems to protect an organization's information assets. This course in Identity and Access Management (IAM) is a great fit for you as it will teach you the essential principles of IAM and how to apply them to protect an organization's information systems.
IT Security Manager
IT Security Managers are responsible for developing and implementing security policies and procedures to protect an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course in Identity and Access Management (IAM) is a great fit for you as it will teach you the essential principles of IAM and how to apply them to protect an organization's information systems.
Security Consultant
Security Consultants help organizations to develop and implement security strategies, policies, and procedures. This course in Identity and Access Management (IAM) is a great fit for your career as it will provide you with the knowledge and skills you need to help organizations protect their information assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cybersecurity Analyst
Cybersecurity Analysts monitor, detect, and respond to cybersecurity threats. This course in Identity and Access Management (IAM) is a great fit for you as it will teach you the essential principles of IAM and how to apply them to protect an organization's information systems from cyber threats.
Chief Information Security Officer (CISO)
As a CISO, you'll be responsible for developing and implementing an organization's information security strategy. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's information assets.
Information Security Analyst
As an Information Security Analyst, you'll be responsible for analyzing, designing, and implementing security controls to protect an organization's data. This course in Identity and Access Management (IAM) can be useful for you since it will teach you how to design and implement access controls, which are essential for protecting data from unauthorized access.
IT Auditor
IT Auditors evaluate an organization's information systems to ensure that they are operating in accordance with established policies and procedures. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in maintaining compliance and managing IT risks.
Privacy Officer
Privacy Officers are responsible for developing and implementing an organization's privacy policies and procedures. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's customer data and maintaining compliance with privacy laws and regulations.
IT Risk Analyst
IT Risk Analysts identify, assess, and mitigate risks to an organization's information systems. This course in Identity and Access Management (IAM) can be helpful for you since it will help you understand the role of IAM in managing IT risks.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's networks. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
Database Administrator (DBA)
Database Administrators (DBAs) are responsible for managing an organization's databases. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's databases from unauthorized access, use, disclosure, disruption, modification, or destruction.
System Administrator
System Administrators are responsible for managing and maintaining an organization's computer systems. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Compliance Auditor
Compliance Auditors are responsible for ensuring that an organization's systems and processes are in compliance with relevant laws and regulations. This IAM course may be useful for you as it will help you understand the importance of identity and access management in maintaining compliance.
Information Technology Support Specialist
Information Technology Support Specialists provide technical support to users of an organization's information systems. This course in Identity and Access Management (IAM) may be useful for you as it will help you understand the importance of IAM in protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Identity and Access Management (IAM) for CISSP®.
Comprehensive guide to IAM and valuable resource for those with some experience in the field. It provides detailed coverage of all aspects of IAM, from planning and implementation to management and auditing.
Provides practice tests for the CISSP exam, which globally recognized certification for information security professionals. The practice tests in this book will help you assess your knowledge of IAM and other topics covered on the CISSP exam.
Provides a comprehensive overview of IAM for cloud computing. It covers the unique challenges of IAM in the cloud and provides best practices for implementing and managing IAM in cloud environments.
This document provides guidance on the implementation of digital identity systems. It valuable resource for learners who want to understand the best practices and standards for identity management.
This textbook provides a comprehensive overview of computer security, including coverage of IAM. It valuable resource for anyone who wants to learn more about the fundamentals of IAM and how it fits into the broader context of computer security.
This textbook provides a comprehensive overview of network security, including coverage of IAM. It valuable resource for anyone who wants to learn more about the fundamentals of IAM and how it fits into the broader context of network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Identity and Access Management (IAM) for CISSP®.
Security Operations and Administration for SSCP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Access Controls Concepts for CC℠
Most relevant
Access Controls for SSCP®
Most relevant
Selection and Approval of Security and Privacy Controls...
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Red Hat Certified Specialist in OpenShift Administration:...
Most relevant
Certified Information Systems Security Professional...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser