IT-säkerhet Identity and Access Management

This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. You will learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).


Implement identity/access management to control access to IT resourcesBuild a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)Streamline identity authentication for applications with claimsSeamlessly authenticate to the cloud with Federated Identity Management (FIM)Synchronise identities amongst disparate authentication stores with Microsoft Identity Manager (MIM) 2016


Module 1: Managing Identities in a Digital World
Identity and its theft

Ensuring strong authentication

Implementing Single Sign-On (SSO)

Surveying IdM solutions

Module 2: Synchronising Identities
Discovering identity stores

Demystifying MIM 2016

Module 3: Implementing Identities in a PKI
Inside PKI X.509 v3 certificates

Establishing trust via certificates

Building an enterprise trust hierarchy

Trusting an external identity provider

Module 4: Expanding Trust with Federated Identity Management
Federated management with Microsoft AD FS 3.0

Creating claims-aware applications

Trusting external Identity Providers

Module 5: Delivering Identities to the Cloud
Windows Azure federation

Amazon AWS federation

Module 6: Mobile Identity Management with BYOD
Enrolling mobile devices

Planning a Federated Identity Roadmap

Kursen levereras genom utbildningspartner: Learning Tree



Typ Öppen
Längd 4 dagar
Ditt pris 32 130 kr exkl. moms
Klippkort Ja
Planerad 1 orter
1 tillfällen


  • Familiarity with security issues at the level of:
    •  Information Security Training
  • Experience with Windows operating system
  • Eliminating vulnerabilities in identification and authentication processes
  • Compromising multiple identities
  • Exploiting Object ID OID identities
  • Enforcing authentication with biometrics
  • Requiring multifactor authentication with smart cards
  • Migrating to virtual smart cards and Trusted Platform Module TPM
  • Interoperating via open industry standards, federated logon and claims
  • Applying Kerberos identities in a domain
  • Making identities portable with Secure Tokens
  • On-premises and cloud-based identity management
  • Exploring identities in Kerberos tickets and AD attributes
  • Identifying identities in SQL databases
  • Importing identities from Connected Data Source CDS into Connector Space CS
  • Synchronising identities into Metaverse MV
  • Managing identities and rules with the SharePoint MIM Portal
  • Expiring identities with certificate lifetimes
  • Verifying identities with Subject Alternative Name
  • Binding identities to certificates
  • Validating trust with digital signatures
  • Creating entity trust by importing a root CA
  • Distributing trust to subordinate CAs
  • Flowing trust with domain Group Policy Object GPO
  • Publishing Certificate Revocation Lists (CRLs)
  • Increasing security with an offline root CA
  • Accessing directories with LDAP
  • Configuring Online Certificate Status Protocol OCSP
  • Forming a certificate chain
  • Locating the CA Trust Anchor
  • Authenticating with a trusted Identity Provider IdP
  • Controlling access with claims
  • Verifying SAML tokens with Relaying Party RP
  • Striving for universally interoperable and portable identity
  • Building claims-aware applications with Windows Identity Foundation WIF
  • Abstracting SAML, WS-Trust and WS-Federation protocols
  • Extending ADFS externally with Web Application Proxy WAP
  • Mapping external ADFS namespaces with DNS
  • Extending on-premises Active Directory (AD) to Azure AD
  • Implementing SSO in Azure for Office 365 and SaaS applications
  • Authenticating with Amazon IAM roles
  • Microsoft federated log-in to Amazon services using SAML tokens
  • Joining devices with Workplace Join
  • Enacting Device Registration Services DRS
  • Achieving the FICAM IdM vision
  • Creating organisational identity management policy