Manage Learn to apply best practices and optimize your operations.

Identity and Access Management Security School

This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan.

Government regulations and the convenience of federated identities have made identity management and access control...

a priority for many enterprises. This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Each lesson is comprised of a webcast, podcast, technical article and quiz -- all available on-demand for your convenience.

   Course outline
   Endpoint security
   VPNs and remote access
   Automated provisioning
   Building an identity and access management architecture
   Integrating security into the network
   Final exam

Send the editor your feedback on this Security School
Learn how you can earn CPE credits from (ISC)²
Visit our other Security Schools
Visit our identity and access management resource center
Submit a question to our identity and access management expert
Download free security IT software

Identity and Access Management Security School Course Outline

Endpoint security
Instructor: Ben Rothke, CISSP
The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent. In this lesson, attendees will learn tactics for endpoint security, policies for controlling endpoints and where endpoint security technology is headed.

VPNs and remote access
Instructor: Lisa Phifer, VP, Core Competence Inc.
Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, attendees learn about the latest innovations in VPN technology, IPsec VPN identity and authentication options, and how to deploy a VPN that meets workforce needs without compromising security.

Automated provisioning
Instructor: Laura Hunter, Laura Hunter, CISSP, MCSE: Security, MCDBA, Microsoft MVP
Setting up new accounts and provisioning hardware are tedious tasks, and mistakes can lead to weak security. In this lesson, attendees will learn how to leverage directory services and policies to automate this task. They'll also learn how to utilize Active Directory to automate provisioning and how the provisioning market place is taking shape.

Building an identity and access management architecture
Instructor: Richard Mackey, ISACA, CISM
Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This lesson explores the essentials of identity and access management, from the role of directories to effectively establishing approval workflows. Attendees will also get tips for tackling the five key challenges in managing identities and effective access control strategies.

Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker
When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors to decide which option best suits their needs. This lesson helps attendees understand the FFIEC's mandate, how to choose the right authentication option for diverse user communities and how to implement an authentication strategy.

Integrating security into the network
Instructor: Mike Rothman, President and Principal Analyst of Security Incite
Through both vendor consolidation and evolution, security capabilities are increasingly being woven into the network fabric. In this lesson, Mike Rothman, president and principal analyst of Security Incite, will help attendees understand the network/security evolution and how to harness this strategic trend to make better tactical decisions. They'll also learn how the roles and responsibilities of security practitioners must inevitably change and how network access control helps contribute to regulatory compliance efforts.

Final exam
After you've completed this six-lesson course, take this final exam to assess your knowledge of identity and access management based on what you've learned in this school.
This was last published in September 2006

Dig Deeper on Privileged access management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.