Home > Store

Identity and Access Management (IAM) Essentials (Video)

Online Video

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2026
  • Edition: 1st
  • Online Video
  • ISBN-10: 0-13-559015-9
  • ISBN-13: 978-0-13-559015-7

Master the full lifecycle of Identity and Access Management (IAM) to secure, scale, and future-proof your organizations digital identity infrastructure.        

                            

Identity and Access Management (IAM) Essentials is a comprehensive video course from security expert Aamir Lakhani that teaches the full IAM lifecyclefrom core concepts and identity lifecycle management to modern authentication, access control, and governance. Through real-world demos and actionable guidance, youll learn directory services and synchronization (Active Directory, Azure AD, LDAP), MFA and passwordless methods, SSO and federation (SAML, OAuth, OpenID Connect), role and privileged access management, and compliance reporting aligned to frameworks like NIST and ISO 27001. The course also covers emerging threats and defenses, including credential stuffing, Mimikatz, and AI-driven attacks against MFA/SSO, plus program metrics and operations to mature IAM in hybrid and cloud environments. Ideal for cybersecurity practitioners, IT administrators, architects, and GRC specialists seeking practical skills to deploy, secure, and govern identity at scale.                      

Skill Level:

  • Beginner to Intermediate

Learn How To:

  • Design hybrid/cloud IAM and automate provisioning with AD/Azure AD/LDAP
  • Harden authentication and SSO with MFA/passwordless and stop credential stuffing, Mimikatz, and MFA/SSO attacks.
  • Align IAM to NIST/ISO/GDPR, produce audit-ready reports, integrate with security tools, and measure maturity.
  • Enforce least privilege with RBAC/PAM, certify access, and drive remediation from audits.

Course requirement:

  • No course requirements

Who Should Take This Course:

  • IAM Engineers and Architects looking to design and deploy secure, scalable identity infrastructures across hybrid or cloud-native environments.
  • Security Analysts and SOC Professionals who need to understand IAM as a control point for threat detection, user behavior analytics, and zero trust enforcement.
  • IT Administrators and System Engineers managing directory services, user provisioning, and federated authentication in Active Directory, Azure AD, or LDAP-based environments.
  • Compliance and GRC Specialists aiming to align identity operations with frameworks such as NIST, ISO 27001, and GDPR, and contribute to audit readiness.

             

About Pearson Video Training:   

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more.  Learn more about Pearson Video training at  http://www.informit.com/video.

Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.

Sample Content

Table of Contents

Lesson 1: IAM Fundamentals 

1.1 IAM introduction

1.2 IAM concepts: Core principles of identity, authentication, authorization, and accounting

1.3 IAM: Identity

1.4 IAM: Authentication

1.5 IAM: Authorization

1.6 IAM: Accounting

1.7 IAM vs PAM

1.8 IAM software

1.9 IAM architecture components: Understanding directories, identity stores, and federation services

1.10 Identity lifecycle: Managing user accounts from creation through deprovisioning

             

Lesson 2: Directory Services Management for Identity and Access Managers: From User Provisioning to System Synchronization

2.1 User provisioning

2.2 External directory services

2.3 System synchronization

2.4 Working with Active Directory, Azure AD, and LDAP systems

2.5 User provisioning: Creating and managing user accounts and group memberships

2.6 Attribute management: Maintaining identity attributes and metadata

2.7 Metadata concerns and privacy risks

2.8 Privacy programs and principles

2.9 Data governance and classification

 

Lesson 3: Authentication Systems for Identity and Access Managers: From Multi-Factor Methods to Federation Services             

3.1 Authentication methods: Implementing passwords, MFA, biometrics, and passwordless solutions

3.2 MFA security and attacks

3.3 AI attacks against MFA - possible future attack trends

3.4 SSO implementation: Deploying single sign-on for enterprise applications

3.5 SSO attacks and weaknesses

3.6 Federation Services: Configuring identity federation between organizations and systems

3.7 Authentication policy: Creating and enforcing organizational authentication requirements

3.8 Alternatives to traditional authentication systems

3.9 Validating and auditing

Lesson 4: Access Control Implementation for Identity and Access Managers: From Role Design to Privileged Management

             

4.1 Access control implementation: Applying permissions and entitlements across systems

4.2 Role management: Creating and maintaining role definitions and assignments

4.3 Access certification: Conducting user access reviews and attestation processes

4.4 Reviewing audit reports for user access

4.5 Privileged Access Management: Securing and monitoring administrative account usage

4.6 Credenitial stuffing attacks

4.7 Mimikatz attacks

4.8 User access control final steps and review

 

Lesson 5: IAM Governance for Identity and Access Managers: From Compliance Monitoring to Program Metrics

5.1 Information security frameworks and standards

5.2 Secure design principles            

5.3 Physical security principles

5.4 Environmental security design

5.5 Compliance reporting: Creating reports for regulatory and policy compliance

5.6 Compliance regulations and certifications

5.7 IAM integration: Connecting identity systems with applications and security tools

 

Lesson 6: Future Vision for IAM

6.1 IAM operations vision and strategy       

6.2 IAM progression and the future

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.