Categories

Information Technology Systems: Identity and Access Management (IAM)


Summary

The British Academy for Training and Development offers this training program on Information Technology Systems: Identity and Access Management (IAM), designed to provide participants with a deep and comprehensive understanding of advanced mechanisms that control access permissions to systems and data within digital organizations.

In an era of rapid digital transformation and increasing reliance on cloud infrastructures and interconnected systems, Identity and Access Management has become the cornerstone of information security, ensuring compliance with institutional policies and international standards. With multiple access sources and a large number of stakeholders—employees, vendors, and partners—the need for effective access management tools becomes essential to protect digital assets and reduce operational risks.

This program focuses on enhancing participants’ capabilities in designing, implementing, and monitoring IAM solutions across different technological environments, ranging from small organizations to complex infrastructures in large enterprises.

Objectives and target group

Who Should Attend?

  • Information security officers in organizations and technology enterprises.

  • IT infrastructure managers and network engineers.

  • Specialists in identity and access management systems.

  • Software and cloud solution developers dealing with user and permission management.

Knowledge and Benefits:

After completing the program, participants will be able to master the following:

  • Understand the fundamental principles of Identity and Access Management (IAM).

  • Develop skills to design and implement access policies for users and applications.

  • Learn about the technologies and protocols used in modern IAM solutions.

  • Acquire skills in managing the digital identity lifecycle within an organization.

  • Enhance security and control within information systems and cloud infrastructure.

Course Content

  • Introduction to Identity and Access Management (IAM)

    • Definition of IAM and its importance in digital organizations.

    • Components of IAM systems and their role in information security.

    • The relationship between IAM and IT governance.

  • Digital Identity Concepts

    • Nature of digital identities for users and systems.

    • Characteristics of unique and trustworthy identities.

    • Difference between identity, authentication, and authorization.

  • Protocols and Standards in IAM

    • LDAP protocol and its role in directory management.

    • SAML, OAuth, and OpenID Connect protocols.

    • International standards for effective IAM implementation.

  • Access and Permission Models

    • Role-Based Access Control (RBAC).

    • Attribute-Based Access Control (ABAC).

    • Fine-grained access policies.

  • Identity Lifecycle Management

    • Creating and activating identities for new users.

    • Modifying permissions and updating access rights.

    • Terminating accounts and revoking access upon exit.

  • Authentication and Multi-Factor Authentication (MFA)

    • Importance of multi-factor authentication in system protection.

    • Types of verification factors available.

    • Integration of MFA with IAM platforms.

  • IAM Integration with Enterprise Infrastructure

    • Connecting IAM with Active Directory and other services.

    • IAM in hybrid environments (On-prem & Cloud).

    • Common integration challenges.

  • Access Management for Cloud Applications

    • Controlling access to SaaS, PaaS, and IaaS.

    • IAM tools in cloud environments such as Azure and AWS.

    • Secure scaling in cloud computing environments.

  • Privileged Access Management (PAM)

    • Difference between IAM and PAM.

    • Protecting sensitive accounts and critical services.

    • PAM tools used in organizations.

  • Session Control and Activity Logging

    • Monitoring access sessions and logging records.

    • Tracking activities of users and administrators.

    • Integration with SIEM systems for audit purposes.

  • IAM in Large Enterprises

    • Challenges of IAM implementation in multi-branch organizations.

    • Unifying identity policies across different systems.

    • Centralized vs decentralized IAM strategies.

  • IAM in Governmental and Financial Institutions

    • Regulatory requirements and relevant legislation.

    • Protecting user data and compliance with standards.

    • Cybersecurity in critical infrastructures.

  • Risk Analysis in Identity and Access

    • Risks of breaches through identity theft.

    • Evaluating gaps in user permissions.

    • Risk analysis tools in IAM.

  • Designing an Effective Access Policy

    • Steps to develop an IAM policy within an organization.

    • Balancing security and usability.

    • Implementing the principle of least privilege.

  • IAM Process Automation

    • Using automation tools in identity management.

    • Implementing workflow rules for requests and approvals.

    • Reducing human errors and improving efficiency.

  • Periodic Privilege Review and Audit

    • Regular examination of accounts and permissions.

    • Preparing audit and compliance reports.

    • Ensuring adherence to security policies.

  • Threats and Attacks on IAM Systems

    • Identity-related attack patterns.

    • Identity theft and phishing attacks.

    • Protection and recovery strategies.

  • Incident Response for Access-Related Breaches

    • Steps to handle access breach incidents.

    • Coordination with cybersecurity teams.

    • Documenting incidents and improving procedures.

  • Commercial and Open-Source IAM Solutions

    • Comparison between leading IAM solutions.

    • Open-source tools vs commercial platforms.

    • Criteria for choosing the most suitable solution.

  • IAM Deployment in Multiple Phases

    • Preparing a phased implementation plan.

    • System testing and effectiveness evaluation.

    • Internal training and ensuring organizational adoption.

  • Digital Transformation and IAM Integration in Modern Projects

    • Role of IAM in smart digital transformation.

    • Managing identities in modern applications (DevOps, IoT, etc.).

    • IAM as part of the institutional transformation strategy.

  • Future Vision of IAM Systems

    • Upcoming technological trends in identity and access.

    • AI and machine learning in IAM.

    • Future of decentralized identity and self-sovereign identity.

Course Date

2026-04-20

2026-07-20

2026-10-19

2027-01-18

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£4300 / Member

Members NO. : 2 - 3
£3440 / Member

Members NO. : + 3
£2666 / Member

Related Course

Featured

Training Program in Troubleshooting and Network Administration

2026-03-16

2026-06-15

2026-09-14

2026-12-14

£4200 £4200

$data['course']