Leader in the cybersecurity training sector.

Identity and Access Management (IAM)

Catégorie
Satisfaction rate
4.5
Success rate
4.9

Introduction and fundamentals for securing information systems 

The target audience for training

  • IT managers, CISOs, security analysts, clearance managers. 
  • Cybersecurity consultants, technical auditors. 
  • HR or business line managers involved in rights management. 

What you will learn

  • Understanding the key concepts of IAM and their role in enterprise cybersecurity. 
  • Identify the components of an IAM architecture (identity management, authorisations, authentication, federation, etc.). 
  • Mapping roles, rights and access according to security principles (RBAC, ABAC, Zero Trust). 
  • Discover best practices for securing access throughout the user lifecycle. 
  • Understanding IAM-related standards, reference systems and tools (ISO 27001, NIST, IAM tools on the market). 

Training programme

  • Introduction: Why IAM is a cornerstone of modern cyber security
  • Module 1: Fundamental concepts - identities, roles, authorisations
    • Definition and objectives of IAM.3
    • Terminology: identity, provisioning, authorisation, SSO, MFA, federation.
    • IAM vs IGA (Identity Governance & Administration).
    • Importance of IAM in the regulatory framework (ISO, RGPD, NIS2, etc.).
    • Players involved (IT, HR, security, business lines).
  • Module 2: Identity lifecycle: creation, modification, withdrawal
    • Stages: onboarding, internal mobility, offboarding.
    • IS account management (Active Directory, SaaS applications, etc.).
    • Automated versus manual processes.
    • Notion of "Just Enough Access" and "Just In Time Access".
    • Security checkpoints (rights review, SoD).
  • Module 3: Access governance models: RBAC, ABAC, Zero Trust
    • RBAC (Role Based Access Control): principles, construction, risks.
    • ABAC (Attribute Based Access Control): flexibility, context.
    • PBAC / UBAC / SoD (Separation of responsibilities).
    • Introduction to the Zero Trust model applied to IAM.
    • How to document and audit an access policy.
  • Module 4: Overview of IAM tools: Azure AD, Okta, CyberArk, etc.
    • Presentation of the major IAM publishers: Microsoft Entra (formerly Azure AD), Okta, CyberArk.
    • Integrated IAM vs specialised solutions.
    • Key features: directories, SSO, MFA, synchronisation, reporting.
    • Integration with corporate directories (LDAP, AD, etc.).
  • Guided case study: mapping rights in a fictitious information system
  • MCQs + discussions on IAM projects in companies

Assessment procedures

  • Final MCQ to validate prior learning (20 questions). 

Teaching methods

  • Training led by an experienced IAM consultant. 
  • Case studies, interactive quizzes, presentation of typical architectures. 
  • Full digital course support with diagrams, glossary and practical worksheets. 

Training objectives

At the end of the course, participants will be able to : 

  1. Define what IAM is and why it is central to a cybersecurity policy. 
  2. Describe the main functions and processes in the identity lifecycle. 
  3. Understanding access governance and rights models (RBAC, SoD, etc.). 
  4. Identifying the business, technical and organisational challenges associated with IAM. 
  5. Understand the IAM solutions on the market and the levers for transformation. 

Training prerequisites

  • Basic knowledge of information systems or cybersecurity. 
  • Initial exposure to access management issues is a plus. 
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.