ISSAP Domain 4: Section 1: Identity and Access Management (IAM) Architecture Course

57 minutes

Syllabus

Introduction to Identity and Access Management (IAM) Architecture

Video - 00:05:00

This is an introduction to Domain 4 of ISSAP, Identity and Access Management (IAM) Architecture.
Establish and verify identity

Video - 00:10:00

Design each phase of the IAM life cycle beginning with Identity.
Assign identifiers (e.g., to users, services, processes, devices)

Video - 00:05:00

Design unique identities for all subjects.
Identity provisioning and de-provisioning

Video - 00:05:00

Identify the provisioning, maintaining and deprovisioning phases and controls.
Define trust relationships (e.g., federated, standalone)

Video - 00:05:00

Identify the required trust relationships (FIM, etcetera).
Define authentication methods (e.g., Multi-Factor Authentication, risk-based, location-based, knowledge-based, object-based, characteristics-based)

Video - 00:10:00

Identify the authentication methods currently being used by the organization and which applications require either 2FA or MFA.
Authentication protocols and technologies (e.g., Security Assertion Markup Language, Remote Authentication Dial-In User Service, Kerberos)

Video - 00:17:00

Identify the authentication protocols and technologies currently being used by the organization, including the methodologies for transferring security credentials.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust