Design of an identity security strategy

Introduction

In this course you will learn how to design and implement identity security strategies . You will learn how different elements work, such as: conditional and privileged access, role assignment and delegation, security authentication and authorization, access reviews and rights management, etc.

Course Description

This course is taught in online mode and consists of 7 units.

The duration of the course is 70 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. Access to the Campus will be available for 6 weeks.

The student will also have participation forums , as well as a continuous tutoring .

Course content

  1. Identity Store Recommendations for Security
  2. Recommend secure security authentication and authorization strategies
  3. Conditional access protection
  4. Design of a strategy for assigning and delegating roles
  5. Defining identity governance for access reviews and rights management
  6. Design of a security strategy for privileged role access to the infrastructure
  7. Design of a security strategy for privileged access

Previous requirements

No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.

€395.00
| /

Información relacionada a la formación

Soporte siempre a tu lado

Soporte de formación: Siempre a tu lado

Formación presencial y telepresencial

¿Necesitas otra modalidad formativa?

bonificaciones

Bonificaciones para empresas