This site is part of the Informa Connect Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

To Be Announced
Live Digital

Learn principles of identity and access management to protect your IT resources

Assure access to your organisation’s assets are limited to the right users in the right context at the right time

Sign Up for Our Professional Certificate in IT Systems: Identity & Access Management Training

Why Attend?

This highly interactive course identifies the threats inherent in increased access through unprotected home-sites, the approaches to installing, implementing and administering a cost-beneficial IAM ecosystem. On this course, we will describe the regulatory and legal ramifications and the constraints surrounding IAM. We will also review the various technologies for corporate facility perimeter protection, cloud and virtual access protection, and protecting against mobile and BYOD threats.

The course includes individual and group exercises, continuous discussions and sharing of information experiences among the participants and instructor, and work on a case study to apply the knowledge and skills learned.

Benefits Of Attending

  • The dangers and threats inherit in expanded access to IT resources
  • The basics of identity and access management implementation
  • How to build Public Key Infrastructure (PKI) to manage interactions within the organisation, and between the organiation and external parties
  • The elements of provisioning: requesting, validating and approving access
  • How to authenticate the identity of users for applications of the organisation in an efficient and unobtrusive way
  • And much more...

Course Competencies

  1. Identity management
  2. Access management
  3. Privacy and privacy regulations
  4. Mobile computing
  5. Cloud computing
  6. Identity theft
  7. Cyber crime and terrorism
  8. IAM strategy and governance
  9. IAM enforcement
  10. Provisioning and de-provisioning

Is this course for you?

Who Should Attend

  • Organisational managers and executives interested in keeping their facilities and data secure and private
  • Security personnel that need to understand how to apply the principles and concepts of IAM
  • Networking professionals who need to apply the concepts of identity and access management to mobile, cloud and other connected devices
  • Data administration and data analytics personnel who need to protect the data they are working with from leakage and modification from malicious intent

Course Methodology

  • This highly interactive course employs the latest in business intelligence and datamining technologies. In addition to practical exercises with business intelligence graphics and data mining algorithms, participants will see real-life business examples of business intelligence and data mining in use with an emphasis on predictive analytics
  • The course is primarily focused on doing rather than listening, so participants will be engaged in exercises for nearly 70% of the class time.

LEARN MORE ABOUT THIS TRAINING COURSE

Delivered by Steve Blais

Steve Blais is a seasoned consultant, trainer, and author with over 50 years of experience in IT and business analysis.

Run this course in-house

For over 29 years, Informa Connect Academy’s customised training solutions have helped organisations deliver tailored learning in different languages to suit every requirement