Identity and Access Management Services, Systems and Technologies

Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Each lesson is comprised of a webcast, podcast, technical article and quiz -- all available on demand for your convenience.

Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Security School explores critical topics related to helping security practitioners establish identity and access management solutions and maintain an effective identity and access management plan for services, systems and technologies. Each lesson is comprised of a webcast, podcast, technical article and quiz -- all available on-demand for your convenience.

The new school of enterprise authentication
Instructor: Mark Diodati, Analyst: Identity and Privacy Strategies, Burton Group

Mark DiodatiCIOs and other corporate executives are pushing IT to pursue more aggressive authentication technologies and tactics to reduce sign-ons, defend against insider abuse and secure enterprise accounts. Luckily, security professionals are now equipped with new types of advanced authentication products and processes that can take on these IAM initiatives. Back by popular demand, Mark Diodati, identity and privacy strategies analyst for Burton Group, in this lesson examines the technologies that cutting-edge organizations use to redefine successful enterprise authentication.

Future authentication technologies: How to choose the right product
Instructor: Mark Diodati, Analyst: Identity and Privacy Strategies, Burton Group

A new generation of authentication products has hit the market, offering innovative and cost-effective approaches, but how do these new products compare with each other, and how should you go about determining which product would best suit your business? This lesson outlines the new product and technology choices available, and identifies what offerings makes sense for your organization's needs.

Using IAM, password and provisioning management tools for compliance
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker; Managing Director, Security Constructs LLC

Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, will show you how.

Endpoint security protection: Polices for endpoint control
Instructor: Ben Rothke, CISSP

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent. In this lesson, attendees will learn tactics for endpoint security, policies for controlling endpoints and where endpoint security technology is headed.

VPNs and remote access: Secure deployment, setup and strategies
Instructor: Lisa Phifer, VP, Core Competence Inc.

Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, attendees learn about the latest innovations in VPN technology, IPsec VPN identity and authentication options, and how to deploy a VPN that meets workforce needs without compromising security.

Automated provisioing of hardware and Active Directory
Instructor: Laura Hunter, Laura Hunter, CISSP, MCSE: Security, MCDBA, Microsoft MVP

Setting up new accounts and provisioning hardware are tedious tasks, and mistakes can lead to weak security. In this lesson, attendees will learn how to leverage directory services and policies to automate this task. They'll also learn how to utilize Active Directory to automate provisioning and how the provisioning market place is taking shape.

How to build an identity and access management architecture
Instructor: Richard Mackey, ISACA, CISM

Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This lesson explores the essentials of identity and access management, from the role of directories to effectively establishing approval workflows. Attendees will also get tips for tackling the five key challenges in managing identities and effective access control strategies.

Secure user authentication: Regulations, implementation and methods
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker

When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors to decide which option best suits their needs. This lesson helps attendees understand the FFIEC's mandate, how to choose the right authentication option for diverse user communities and how to implement an authentication strategy.

Building network security: Evolution and vendor consolidation
Instructor: Mike Rothman, President and Principal Analyst of Security Incite

Through both vendor consolidation and evolution, security capabilities are increasingly being woven into the network fabric. In this lesson, Mike Rothman, president and principal analyst of Security Incite, will help attendees understand the network/security evolution and how to harness this strategic trend to make better tactical decisions. They'll also learn how the roles and responsibilities of security practitioners must inevitably change and how network access control helps contribute to regulatory compliance efforts.

Identity and Access Management final exam
After you've completed this six-lesson course, take this final exam to assess your knowledge of identity and access management based on what you've learned in this school.

This was first published in July 2006

Dig deeper on Two-Factor and Multifactor Authentication Strategies

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close