Identity and Access Management Services, Systems and Technologies
| Identity and Access Management Security School Course
Outline |

-->
-->
The new school of enterprise authentication
Instructor: Mark Diodati, Analyst: Identity and Privacy Strategies, Burton
Group
CIOs and other corporate executives are pushing IT to pursue more aggressive authentication
technologies and tactics to reduce sign-ons, defend against insider abuse and secure enterprise
accounts. Luckily, security professionals are now equipped with new types of advanced
authentication products and processes that can take on these IAM initiatives. Back by popular
demand, Mark Diodati, identity and privacy strategies analyst for Burton Group, in this lesson
examines the technologies that cutting-edge organizations use to redefine successful enterprise
authentication.

@36435 Future authentication technologies: How to choose the right
product
Instructor: Mark Diodati, Analyst: Identity and Privacy Strategies, Burton
Group
A new generation of authentication products has hit the market, offering innovative and
cost-effective approaches, but how do these new products compare with each other, and how should
you go about determining which product would best suit your business? This lesson outlines the new
product and technology choices available, and identifies what offerings makes sense for your
organization's needs.

-->
-->
Using IAM, password and provisioning management tools for
compliance
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker; Managing
Director, Security Constructs LLC
Provisioning and password management tools can ease complexity, reduce help desk calls and save
money. But they also have an added benefit: they can help with your compliance woes. In this
lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, will show you
how.

Endpoint security protection: Polices for endpoint control
Instructor: Ben Rothke, CISSP
The start- and end-points of today's enterprise networks are radically different than they were 10
years ago. IT staffs no longer have control over every endpoint connecting to the network, leading
to a host of problems where access control is weak or nonexistent. In this lesson, attendees will
learn tactics for endpoint security, policies for controlling endpoints and where endpoint security
technology is headed.

VPNs and remote access: Secure deployment, setup and strategies
Instructor: Lisa Phifer, VP, Core Competence Inc.
Virtual private networks can reduce the cost of business communication while extending secure
remote access to teleworkers, travelers and mobile professionals. But deploying and managing a
secure VPN can be challenging. In this lesson, attendees learn about the latest innovations in VPN
technology, IPsec VPN identity and authentication options, and how to deploy a VPN that meets
workforce needs without compromising security.

Automated provisioing of hardware and Active Directory
Instructor: Laura Hunter, Laura Hunter, CISSP, MCSE: Security, MCDBA, Microsoft
MVP
Setting up new accounts and provisioning hardware are tedious tasks, and mistakes can lead to weak
security. In this lesson, attendees will learn how to leverage directory services and policies to
automate this task. They'll also learn how to utilize Active Directory to automate provisioning and
how the provisioning market place is taking shape.

How to build an identity and access management architecture
Instructor: Richard Mackey, ISACA, CISM
Regardless of a company's size, managing identity can be a huge undertaking that requires the
efficient oversight of many moving parts. This lesson explores the essentials of identity and
access management, from the role of directories to effectively establishing approval workflows.
Attendees will also get tips for tackling the five key challenges in managing identities and
effective access control strategies.

@23226 Secure user authentication: Regulations, implementation and
methods
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical
Hacker
When deploying any authentication option – whether to comply with the FFIEC's two-factor
authentication mandate or simply strengthen access controls – businesses need to weigh several
factors to decide which option best suits their needs. This lesson helps attendees understand the
FFIEC's mandate, how to choose the right authentication option for diverse user communities and how
to implement an authentication strategy.

Building network security: Evolution and vendor consolidation
Instructor: Mike Rothman, President and Principal Analyst of Security
Incite
Through both vendor consolidation and evolution, security capabilities are increasingly being woven
into the network fabric. In this lesson, Mike Rothman, president and principal analyst of Security
Incite, will help attendees understand the network/security evolution and how to harness this
strategic trend to make better tactical decisions. They'll also learn how the roles and
responsibilities of security practitioners must inevitably change and how network access control
helps contribute to regulatory compliance efforts.

Identity and Access Management final exam
After you've completed this six-lesson course, take this final exam to assess your knowledge of
identity and access management based on what you've learned in this school.
This was first published in July 2006
Join the conversationComment
Share
Comments
Results
Contribute to the conversation