CVF 1073 - Identity Security and Access Management I Credits: 3 Hours/Week: Course Description: This course provides a fundamental and medium-level overview of the field of “Identity Security and Access Management (IAM)” and related security components to enable effective design and implementation of a secured IAM architecture.
Hands-on lab activities include demonstration or use of Advanced Threat Analytics (ATA), Identity as a service (IDaaS), SaaS-based IAM offerings, SSO using SAML or OIDC, Identity Access Governance (IGA), LDAP in *nix/Windows/Mac, Intelligence: Intelligence: Identity access log monitoring and reporting, User behaviors analytics. MnTC Goals None
Prerequisite(s): CVF 1083 with a grade of C or higher OR instructor consent. Corequisite(s): None Recommendation: CVF 1071 with a grade of C or higher.
Major Content 1. Managing Identities in a Digital WorldIdentity
- Identity and its theft
- Eliminating vulnerabilities in identification and authentication processes
- Compromising multiple identities
- Exploiting Object ID OID identities
- Ensuring strong authentication
- Enforcing authentication with biometrics
- Requiring multifactor authentication with smart cards
- Migrating to virtual smart cards and Trusted Platform Module TPM
- Implementing Single Sign-On (SSO)
- Interoperating via open industry standards, federated logon and claims
- Applying Kerberos identities in a domain
- Surveying IdM solutions
- Making identities portable with Secure Tokens
- On-premises and cloud-based identity management
2. Synchronizing Identities
- Discovering identity stores
- Exploring identities in Kerberos tickets and AD attributes
- Identifying identities in SQL databases
- Demystifying MIM 2016
- Importing identities from Connected Data Source CDS into Connector Space CS
- Synchronizing identities into Metaverse MV
- Managing identities and rules with the SharePoint MIM Portal
3. Implementing Identities in a PKI
- Inside PKI X.509 v3 certificates
- Expiring identities with certificate lifetimes
- Verifying identities with Subject Alternative Name
- Binding identities to certificates
- Establishing trust via certificates
- Validating trust with digital signatures
- Creating entity trust by importing a root CA
- Distributing trust to subordinate CAs
- Flowing trust with domain Group Policy Object GPO
Learning Outcomes At the end of this course, students will be able to:
- explain various challenges associated with identity security and access management.
- discuss the fundamental concepts and the importance of Authorization, Authentication, Administration and Audit to Identity Security and Access Management.
- explain importance of single sign on and various technology and protocols needed to support Access Management.
- design, Install and Configure PKI solutions to manage trust between Relying Parties (RPs) and Identity Providers (IdPs).
- explain Microsoft Identity Manager (MIM).
- synchronize identities store among disparate authentication stores with 3rd party.
Competency 1 (1-6) None Competency 2 (7-10) None Courses and Registration
Add to Portfolio (opens a new window)
|