وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Guide to Identity and Access Management for Network Engineers

سرفصل های دوره

The course provides network professionals with a comprehensive exploration of identity and access management. Instructor Liam Cleary covers the fundamentals of IAM, including authentication mechanisms, authorization, access control techniques, and the intricacies of account management and identity federation. Liam also focuses on implementing IAM in cloud environments and strategies for monitoring and reporting to ensure robust security.

Advanced topics such as security protocols, encryption, and privileged access management (PAM) are also covered, along with practical aspects of integrating IAM with network infrastructure and automating IAM tasks using tools like PowerShell and Python.

Whether you want to deepen your existing knowledge or branch out into new areas of network security, this course combines theory with practical application, preparing you to manage identities and secure access effectively in any network environment.


01 - Introduction
  • 01 - Complete guide to IAM for network engineers

  • 02 - 1. Introduction to Identity and Access Management in Networking
  • 01 - Overview of IAM in networking
  • 02 - Key components of IAM in network security
  • 03 - Setting up basic IAM roles and policies on Windows Server
  • 04 - IAM framework overview
  • 05 - Basic IAM configuration techniques

  • 03 - 2. Authentication Mechanisms in IAM
  • 01 - Authentication protocols
  • 02 - Understanding multifactor authentication (MFA)
  • 03 - Implementing MFA on a Linux server
  • 04 - Configuring MFA for remote access to a Windows environment
  • 05 - Best practices in network authentication

  • 04 - 3. Authorization and Access Control
  • 01 - Access control models and implementation
  • 02 - Role-based access control (RBAC) explained
  • 03 - Implementing RBAC in a Windows Server environment
  • 04 - Configuring RBAC on a Linux server
  • 05 - Setting up ACL on Linux for file-level security
  • 06 - Advanced access control techniques

  • 05 - 4. Account Management and Identity Federation
  • 01 - Account lifecycle management overview
  • 02 - Introduction to identity federation
  • 03 - Identity federation in Active Directory
  • 04 - Configuring Azure AD for SSO with SaaS applications
  • 05 - Google Cloud Identity-Aware Proxy for application access

  • 06 - 5. IAM in Cloud Environments
  • 01 - IAM features in AWS
  • 02 - IAM features in Azure
  • 03 - IAM features in GCP
  • 04 - Configuring IAM roles and policies in AWS
  • 05 - Setting up Azure AD and managing IAM in Azure
  • 06 - Implementing service accounts and roles in GCP

  • 07 - 6. Monitoring and Reporting in IAM
  • 01 - IAM monitoring tools and techniques
  • 02 - Setting up audit trails in IAM
  • 03 - Setting up logging in Azure AD
  • 04 - Compliance checks and reporting in GCP

  • 08 - 7. Advanced Security Protocols and Encryption in IAM
  • 01 - Overview of security protocols in IAM
  • 02 - Implementing encryption in IAM
  • 03 - Configuring SSLTLS on Windows Server
  • 04 - Secure SSH keys within a Linux server
  • 05 - Advanced encryption and key management in Linux
  • 06 - Security best practices in IAM

  • 09 - 8. Integrating IAM with Network Infrastructure
  • 01 - IAM integration with networking devices
  • 02 - Network access control (NAC) and IAM
  • 03 - IAM for secure remote access
  • 04 - IAM policy implementation in network devices
  • 05 - Managing network device credentials

  • 10 - 9. Automation in IAM
  • 01 - Introduction to IAM automation
  • 02 - Tools and scripts for IAM automation
  • 03 - Automating user accounts using PowerShell in Windows AD
  • 04 - Python scripts for automated IAM tasks in Linux
  • 05 - Automated IAM report generation using PowerShell and Python
  • 06 - Best practices in IAM automation

  • 11 - 10. Privileged Access Management
  • 01 - Overview of PAM
  • 02 - Key concepts in privileged access management
  • 03 - Configuring PAM in cloud environments
  • 04 - Setting up PAM in Microsoft 365 and Azure
  • 05 - Future directions in PAM

  • 12 - Conclusion
  • 01 - Continuing your IAM journey
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 39687
    حجم: 765 مگابایت
    مدت زمان: 409 دقیقه
    تاریخ انتشار: 22 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید