Mastering Identity Governance and Administration: Ensuring Total Risk Coverage Mastering Identity Governance and Administration: Ensuring Total Risk Coverage
This comprehensive course is designed to provide participants with a deep understanding of identity governance and administration, ensuring total risk coverage. Upon completion, participants will receive a certificate issued by The Art of Service. This course is:
- Interactive and engaging, with hands-on projects and gamification
- Comprehensive, covering all aspects of identity governance and administration
- Personalized, with flexible learning options and progress tracking
- Up-to-date, with the latest industry trends and best practices
- Practical, with real-world applications and actionable insights
- High-quality, with expert instructors and high-quality content
- Certified, with a certificate issued upon completion
- Flexible, with lifetime access and mobile-accessible content
- Community-driven, with a community of like-minded professionals
Chapter 1: Introduction to Identity Governance and Administration
- 1.1 What is Identity Governance and Administration?
- 1.1.1 Definition and scope
- 1.1.2 Importance and benefits
- 1.2 Key Concepts and Terminology
- 1.2.1 Identity and access management
- 1.2.2 Identity governance
- 1.2.3 Identity administration
- 1.3 Industry Trends and Best Practices
- 1.3.1 Cloud-based identity management
- 1.3.2 Artificial intelligence and machine learning
- 1.3.3 Identity and access management as a service
Chapter 2: Identity Governance Frameworks and Models
- 2.1 Identity Governance Frameworks
- 2.1.1 NIST Cybersecurity Framework
- 2.1.2 ISO/IEC 27001
- 2.1.3 COBIT 5
- 2.2 Identity Governance Models
- 2.2.1 Identity and access management maturity model
- 2.2.2 Identity governance and administration maturity model
- 2.3 Identity Governance and Administration Roadmap
- 2.3.1 Developing a roadmap
- 2.3.2 Implementing a roadmap
Chapter 3: Identity and Access Management
- 3.1 Identity and Access Management Fundamentals
- 3.1.1 Identity and access management concepts
- 3.1.2 Identity and access management processes
- 3.2 Identity and Access Management Systems
- 3.2.1 Identity and access management systems architecture
- 3.2.2 Identity and access management systems implementation
- 3.3 Identity and Access Management Technologies
- 3.3.1 Single sign-on
- 3.3.2 Multi-factor authentication
- 3.3.3 Identity federation
Chapter 4: Identity Governance and Administration
- 4.1 Identity Governance and Administration Fundamentals
- 4.1.1 Identity governance and administration concepts
- 4.1.2 Identity governance and administration processes
- 4.2 Identity Governance and Administration Systems
- 4.2.1 Identity governance and administration systems architecture
- 4.2.2 Identity governance and administration systems implementation
- 4.3 Identity Governance and Administration Technologies
- 4.3.1 Identity and access management as a service
- 4.3.2 Cloud-based identity governance and administration
Chapter 5: Risk Management and Compliance
- 5.1 Risk Management Fundamentals
- 5.1.1 Risk management concepts
- 5.1.2 Risk management processes
- 5.2 Compliance Fundamentals
- 5.2.1 Compliance concepts
- 5.2.2 Compliance processes
- 5.3 Identity Governance and Administration Risk Management and Compliance
- 5.3.1 Identity governance and administration risk management
- 5.3.2 Identity governance and administration compliance
Chapter 6: Identity Governance and Administration Implementation and Operation
- 6.1 Identity Governance and Administration Implementation
- 6.1.1 Identity governance and administration implementation planning
- 6.1.2 Identity governance and administration implementation execution
- 6.2 Identity Governance and Administration Operation
- 6.2.1 Identity governance and administration operation planning
- 6.2.2 Identity governance and administration operation execution
- 6.3 Identity Governance and Administration Maintenance and Support
- 6.3.1 Identity governance and administration maintenance
- 6.3.2 Identity governance and administration support
Chapter 7: Identity Governance and Administration Monitoring and Reporting
- 7.1 Identity Governance and Administration Monitoring