This course provides a comprehensive introduction to IM (and IAM) solutions that are increasingly being used to solve identity management security problems in authentication systems. Organizations today increasingly rely on services provided by the Internet and networked systems to conduct business, and for security are forced to authenticate multiple times to multiple authentication systems. At the same time, cyber-crime and security violations pose an ever-growing threat to business-critical functions and data. Single Sign-On (SSO), Public Key Infrastructure (PKI) and Federations, provide the overall security framework and tools for IM, enabling organizations to reduce security threats, safeguard sensitive data and maintain business continuity. Once implemented, IM can lower overall security costs and increase interoperability within and between various enterprise systems. This course presents the best and the most practical solutions and skills for creating your own IM strategy. By implementing the latest Microsoft PKI and Federation solutions, managers and administrators are able to select appropriate IM strategies for their organization, as well as provide SSO best practices for enterprise, BYOD mobile devices, and Azure and Amazon cloud applications. After participating in this course, attendees will be able to implement IM solutions in the specific context of their organization.
Learning Objectives
- Implement identity management solutions to control access to IT resources
- Build a Public Key Infrastructure (PKI) to manage enterprise trust
- Seamlessly implement external trusts among organizations with federated Identity Management (IM)
- Enhance authentication with digital certificates, smart cards and biometrics
- Extend Single Sign-On (SSO) to Azure and Amazon clouds
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Systems Architecture
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.