Course description
Take an in-depth look at identity and access management architecture concepts, methodologies and techniques, including centralized and decentralized identity and authentication management (IAM) systems, technologies and controls; access controls; authentication methods; and access controls practices. You’ll also learn principles of IAM such as critical requirements for protecting data, systems, physical assets and people.