IT Systems: Identity and Access Management

IAM is a set of processes, policies, and tools for controlling user access to critical information within an organization

Introduction

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises and role playing that allow all participants to use the knowledge they gained to demonstrate their skills in identity and access management.

Course Objectives

  • Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options.
  • Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate based authentication, device authentication, etc).
  • Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies.
  • Explain the most well-known access control mechanisms and the roles of oauth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO.
  • Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and boarder gate, mobile-banking, EMV scheme, and e-movement services).

Course Outlines:

Day 1: Introduction and principles of information security:

  • Identity and access management (IAM) overview.
  • Attributes of information security.
  • Confidentiality.
  • Integrity.
  • Availability.
  • Non-repudiation.
  • Accountability.
  • Auditability.
  • Symmetric and asymmetric cryptography.
  • Hashing and digital signature.
  • Key management.

Day 2: Public Key Infrastructure (PKI)

  • Architecture: certification and registration authority.
  • Life cycle management.
  • Types of certificates and usage patterns.
  • Encryption.
  • Digital signature.
  • Client certificate.
  • SSL server certificate.
  • Attribute based certificate.
  • Case studies (e.g. email protection, mobile banking, and document signing).

Day 3: Identification and authentication

  • Identification, verification and authentication overview.
  • Mechanisms of identification and authentication.
  • One time password.
  • Biometric.
  • Digital signature.
  • Smartcard.
  • Soft/hard tokens.
  • Mobile device.
  • Risk based authentication.
  • Step-up authentication.
  • Single-sign on and federated single-sign-on.
  • OATH, OpenID, BorwserID, and SAML.
  • Architecture framework and industrial tools.
  • Trusted computing role in identity assurance.
  • Security risks associated with the discussed mechanisms.

Day 4: Access control

  • Principles of authorization.
  • Access control schemes.
  • OAuth protocol.
  • Enterprise rights management and digital rights management.
  • Privileged account management.
  • Governance and compliance.

Day 5: IAM framework and use cases

  • IAM architecture framework.
  • IAM echo system.
  • IAM and cloud computing.
  • Illustrative use cases.
  • Border control.
  • E-passport.
  • National ID.
  • E-banking.
  • E-health system.

Filter

  • All
  • Nov 2024
  • Dec 2024
  • Jan 2025
  • Feb 2025
  • Mar 2025
  • Apr 2025
  • May 2025
  • Jun 2025
  • Jul 2025
  • Aug 2025
  • Sep 2025
  • Oct 2025
  • London (UK)
  • Paris (France)
  • Amsterdam (Netherlands)
  • Barcelona (Spain)
  • Vienna (Austria)
  • Berlin (Germany)
  • Düsseldorf (Germany)
  • Munich (Germany)
  • Geneva (Switzerland)
  • Rome (Italy)
  • Prague (Czech)
  • Brussels (Belgium)
  • Toronto (Canada)
  • Lisbon (Portugal)
  • Istanbul (Turkey)
  • Manama (Bahrain)
  • Dubai (UAE)
  • Cairo (Egypt)
  • Tunis (Tunisia)
  • Kuala Lumpur (Malaysia)
  • Amman (Jordan)
  • Casablanca (Morocco)
  • Malaga (Spain)
  • Baku (Azerbaijan)
  • Orlando, Florida (USA)
  • Maldives (Maldives)
  • Kigali (Rwanda)
  • Cape Town (South Africa)
  • Accra (Ghana)
  • Boston,Massachusetts (USA)
  • Washington (USA)