Identity and Access Management (IAM) Essentials

Identity and Access Management (IAM) Essentials

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 53 Lessons (7h 27m) | 7.03 GB

Aamir Lakhani isa highly regarded senior security strategist known for architecting detailed security solutions for major enterprises, including healthcare, finance, and government organizations. He focuses on creating technical security strategies and leading complex implementation projects, with a strong emphasis on Identity and Access Management (IAM) within complex computing environments. Aamir’s experience includes designing offensive counter-defense strategies for national intelligence agencies and assisting organizations in safeguarding IT environments from underground cybercriminal groups. He is an industry leader in APT research, malware management, and the investigation of vulnerabilities related to the dark security movement, providing deep insight into the attacker’s mindset crucial for effective IAM defense.

Learn How To:

  • Provision and manage user accounts and group memberships across enterprise directory services.
  • Gain hands-on experience with essential systems for seamless integration and synchronization.
  • Master attribute management, including maintaining identity attributes and metadata for accurate access control.
  • Understand privacy risks and implement effective privacy programs and principles within identity management.
Table of Contents

1 Identity and Access Management (IAM) Essentials Introduction
2 Learning objectives
3 IAM introduction
4 IAM concepts Core principles of identity, authentication, authorization, and accounting
5 IAM Identity
6 IAM Authentication
7 IAM Authorization
8 IAM Accounting
9 IAM vs PAM
10 IAM software
11 IAM architecture components Understanding directories, identity stores, and federation services
12 Identity lifecycle Managing user accounts from creation through deprovisioning
13 Learning objectives
14 User provisioning
15 External directory services
16 System synchronization
17 Working with Active Directory, Azure AD, and LDAP systems
18 User provisioning Creating and managing user accounts and group memberships
19 Attribute management Maintaining identity attributes and metadata
20 Metadata concerns and privacy risks
21 Privacy programs and principles
22 Data governance and classification
23 Learning objectives
24 Authentication methods Implementing passwords, MFA, biometrics, and passwordless solutions
25 MFA security and attacks
26 AI attacks against MFA – possible future attack trends
27 SSO implementation Deploying single sign-on for enterprise applications
28 SSO attacks and weaknesses
29 Federation Services Configuring identity federation between organizations and systems
30 Authentication policy Creating and enforcing organizational authentication requirements
31 Alternatives to traditional authentication systems
32 Validating and auditing
33 Learning objectives
34 Access control implementation Applying permissions and entitlements across systems
35 Role management Creating and maintaining role definitions and assignments
36 Access certification Conducting user access reviews and attestation processes
37 Reviewing audit reports for user access
38 Privileged Access Management Securing and monitoring administrative account usage
39 Credenitial stuffing attacks
40 Mimikatz attacks
41 User access control final steps and review
42 Learning objectives
43 Information security frameworks and standards
44 Secure design principles
45 Physical security principles
46 Environmental security design
47 Compliance reporting Creating reports for regulatory and policy compliance
48 Compliance regulations and certitifcations
49 IAM integration Connecting identity systems with applications and security tools
50 Learning objectives
51 IAM operations vision and strategy
52 IAM progression and the future
53 Identity and Access Management (IAM) Essentials Summary

Homepage