Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
Master the full lifecycle of Identity and Access Management (IAM) to secure, scale, and future-proof your organizations digital identity infrastructure.
Identity and Access Management (IAM) Essentials is a comprehensive video course from security expert Aamir Lakhani that teaches the full IAM lifecyclefrom core concepts and identity lifecycle management to modern authentication, access control, and governance. Through real-world demos and actionable guidance, youll learn directory services and synchronization (Active Directory, Azure AD, LDAP), MFA and passwordless methods, SSO and federation (SAML, OAuth, OpenID Connect), role and privileged access management, and compliance reporting aligned to frameworks like NIST and ISO 27001. The course also covers emerging threats and defenses, including credential stuffing, Mimikatz, and AI-driven attacks against MFA/SSO, plus program metrics and operations to mature IAM in hybrid and cloud environments. Ideal for cybersecurity practitioners, IT administrators, architects, and GRC specialists seeking practical skills to deploy, secure, and govern identity at scale.
Skill Level:
Learn How To:
Course requirement:
Who Should Take This Course:
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Lesson 1: IAM Fundamentals
1.1 IAM introduction
1.2 IAM concepts: Core principles of identity, authentication, authorization, and accounting
1.3 IAM: Identity
1.4 IAM: Authentication
1.5 IAM: Authorization
1.6 IAM: Accounting
1.7 IAM vs PAM
1.8 IAM software
1.9 IAM architecture components: Understanding directories, identity stores, and federation services
1.10 Identity lifecycle: Managing user accounts from creation through deprovisioning
Lesson 2: Directory Services Management for Identity and Access Managers: From User Provisioning to System Synchronization
2.1 User provisioning
2.2 External directory services
2.3 System synchronization
2.4 Working with Active Directory, Azure AD, and LDAP systems
2.5 User provisioning: Creating and managing user accounts and group memberships
2.6 Attribute management: Maintaining identity attributes and metadata
2.7 Metadata concerns and privacy risks
2.8 Privacy programs and principles
2.9 Data governance and classification
Lesson 3: Authentication Systems for Identity and Access Managers: From Multi-Factor Methods to Federation Services
3.1 Authentication methods: Implementing passwords, MFA, biometrics, and passwordless solutions
3.2 MFA security and attacks
3.3 AI attacks against MFA - possible future attack trends
3.4 SSO implementation: Deploying single sign-on for enterprise applications
3.5 SSO attacks and weaknesses
3.6 Federation Services: Configuring identity federation between organizations and systems
3.7 Authentication policy: Creating and enforcing organizational authentication requirements
3.8 Alternatives to traditional authentication systems
3.9 Validating and auditing
Lesson 4: Access Control Implementation for Identity and Access Managers: From Role Design to Privileged Management
4.1 Access control implementation: Applying permissions and entitlements across systems
4.2 Role management: Creating and maintaining role definitions and assignments
4.3 Access certification: Conducting user access reviews and attestation processes
4.4 Reviewing audit reports for user access
4.5 Privileged Access Management: Securing and monitoring administrative account usage
4.6 Credenitial stuffing attacks
4.7 Mimikatz attacks
4.8 User access control final steps and review
Lesson 5: IAM Governance for Identity and Access Managers: From Compliance Monitoring to Program Metrics
5.1 Information security frameworks and standards
5.2 Secure design principles
5.3 Physical security principles
5.4 Environmental security design
5.5 Compliance reporting: Creating reports for regulatory and policy compliance
5.6 Compliance regulations and certifications
5.7 IAM integration: Connecting identity systems with applications and security tools
Lesson 6: Future Vision for IAM
6.1 IAM operations vision and strategy
6.2 IAM progression and the future
