• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5 Identity & Access Management courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Azure Active Directory - Identity & Access Management

4.8(8)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Azure Active Directory - Identity & Access Management
Delivered Online On Demand
£25

Your guide to Identity and Access Management (IAM)

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Identity and Access Management (IAM)
Delivered Online On Demand
FREE

VMware Workspace ONE: Advanced Integrations [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence™ and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. COURSE INTRODUCTION * Introduction and course logistics * Course objectives WORKSPACE ONE PLATFORM * List the high-level components of the Workspace ONE platform * Identify benefits of integrating Workspace ONE Access with other Workspace ONE products * Explain what services Workspace ONE Access offers * Outline the use cases for Workspace ONE Access Connector IDENTITY SOURCES * Identify different directory types in Workspace ONE Access based on identity sources * Explain supported web standards for identity * Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory * Identify features and use cases of third-party identity sources * Identify the features and use cases of the VMware AirWatch© Provisioning app AUTHENTICATION * Identify the benefits of modern identity and access management * Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID * Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify ACCESS POLICIES * Explain access policies and their importance * Describe how identity providers (IdPs) and authentication methods work with access policies * Explain how to create policy rules following best practice CATALOG * Define the types of resources in the Workspace ONE Access catalog * Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access * Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access HUB SERVICES * Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access * Illustrate the primary components of Hub Services * Describe the features and use cases of Workspace ONE Verify * Explain how to deploy mobile flows according to a use case WORKSPACE ONE INTELLIGENCE * Describe how Workspace ONE Intelligence supports your deployment and management strategy * Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey * Explain how you can use Dashboards to access different data for your device management use cases * Explain how integration works to connect and share data with third parties WORKSPACE ONE APPLICATION PROGRAMMING INTERFACE * Outline the use cases for using the Workspace ONE API * Explain how to perform Workspace ONE UEM administration and maintenance through the API * Explain how to perform Workspace ONE Access administration and maintenance through the API DESIGN METHODOLOGY * Explain the Workspace ONE business drivers and use case definition * Define Workspace ONE services * Discuss how to make architectural design decisions * Explain how to create component designs * Discuss which third-party components are required for infrastructure design * Discuss the process of platform integration * Explain the required services for service integration * Explain how to design user experience

VMware Workspace ONE: Advanced Integrations [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Workspace ONE: Integrations [V22.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. COURSE INTRODUCTION * Introductions and course logistics * Course objectives WORKSPACE ONE ACCESS * Summarize the benefits of Workspace ONE Access * Outline the core features and functions enabled by Workspace ONE Access * Navigate the Workspace ONE Access console * Explain the functions of directory integration with Workspace ONE Access * Explain the various types of authentication protocols enabled by Workspace ONE Access INTEGRATING WORKSPACE ONE UEM AND WORKSPACE ONE ACCESS * Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access * Outline the process of connecting Workspace ONE UEM and Workspace ONE Access * Examine the workflow of integrations * Summarize the key features of an integrated solution PRODUCTIVITY INTEGRATIONS * Identify the functions enabled by VMware Unified Access Gateway? * Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service * Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service * Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 AUTHENTICATION * Outline authentication methods supported by Workspace ONE Access * Summarize the main properties of the SAML protocol * Summarize the SAML authentication workflow * Explain the application single sign-on authentication workflow with SAML MOBILE SINGLE SIGN-ON * Describe the concept of mobile single sign-on * Outline mobile single sign-on workflows INTELLIGENCE AND AUTOMATION * Summarize the features of Workspace ONE© Intelligence? * Outline the benefits of using Workspace ONE Intelligence

VMware Workspace ONE: Integrations [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Red Hat Identity Management and Active Directory Integration with exam (RH363)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). INSTALL RED HAT IDENTITY MANAGEMENT * Describe and install Red Hat Identity Management (IdM). CENTRALIZE IDENTITY MANAGEMENT * Explain the IdM server services, explore IdM clients access methods, and install an IdM client. AUTHENTICATE IDENTITIES WITH KERBEROS * Define the Kerberos protocol and configure services for Kerberos authentication. INTEGRATE IDM WITH ACTIVE DIRECTORY * Create a trust relationship with Active Directory. CONTROL USER ACCESS * Configure users for authorized access to services and resources. MANAGE A PUBLIC KEY INFRASTRUCTURE * Manage certificate authorities, certificates, and storing secrets. MAINTAIN IDM OPERATIONS * Troubleshoot and recover Identity Management. INTEGRATE RED HAT PRODUCTS WITH IDM * Configure major services to share the IdM authentication database. INSTALL SCALABLE IDM * Construct a resilient and scalable Identity Management topology.

Red Hat Identity Management and Active Directory Integration with exam (RH363)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Identity & Access Management"

Show all 3
Cyber Security Training Courses

cyber security training courses

Kent

The Cyber Security training market is saturated with different providers all offering similar training courses. With so many to choose from navigating the different providers is a long process. Cyber Security Training Courses simplifies this by pulling in the training courses from all the providers to one site and one easy search The site was launched to enhance the service that we provide via CyberSecurityJobsite.com, the specialist site for the cyber security market. We offer an information portal that can assist candidates to find the best courses to progress their career within the IT security industry. We host 100s of training courses, undergraduate and post graduate university courses and apprenticeships from training providers, leading universities and colleges and industry leading employers. Whether you are looking for a course to progress your own career or looking for a training provider to enhance your employee’s skills, the site can assist you. Register with us to apply for courses, receive industry news or receive email alerts if a course is added to the site that matches your criteria. CyberSecurityJobsite now also runs the Cyber Security EXPO which is the only dedicated recruitment event designed for Clients and Candidates within the Cyber Security / InfoSec marketplace. The EXPO's are Free to attend for all registered candidates and provides an opportunity to meet with direct employers and recruitment agencies that are recruiting in this space. If you have any question on how we operate, please contact one of the team.