糖心vlog官网观看

Macquarie University
Identity Access Management (IAM) and Secure Authentication

Early bird sale! Unlock 10,000+ courses from Google, IBM, and more for 50% off. Save today.

Macquarie University

Identity Access Management (IAM) and Secure Authentication

Matt Bushby

Instructor: Matt Bushby

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Principles of Least Privilege and Role-Based Access Control (RBAC)

  • Implementation and Use of Multi-Factor Authentication (MFA)

  • Managing and Securing User Identities

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

June 2025

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

In today鈥檚 digital world, managing who has access to what鈥攁nd when鈥攊s critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for everything to come in the course. You鈥檒l explore the core components of the IAM ecosystem, learn how to talk about IAM in a business and technical context, and become familiar with the authentication methods commonly used across industries. We鈥檒l also break down the elements of effective IAM architecture, giving you the tools to start designing access management systems based on specific organisational requirements. By the end of this topic, you鈥檒l understand how IAM supports security and operations鈥攁nd be able to design a simple but effective IAM architecture tailored to real-world needs.

What's included

1 assignment17 plugins

Effective identity and access management isn鈥檛 just about authentication鈥攊t鈥檚 about managing the entire user lifecycle. In this topic, you'll explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation. We鈥檒l examine how these processes differ across cloud and on-premises environments, and dive into the limitations, compromises, and security trade-offs that come with each. You'll also learn how to configure selected IAM processes and adapt them to meet the needs of your organisation. By the end of this topic, you鈥檒l have a clear understanding of how IAM processes support secure access at every stage of the user journey鈥攁nd how to implement them effectively in real-world environments.

What's included

1 assignment5 plugins

In a world of cloud services, multiple platforms, and growing user demands, seamless and secure access is more important than ever. This topic explores identity federation鈥攖he practice of linking a user鈥檚 digital identity across systems and organisations to enable smoother and more secure authentication. You鈥檒l learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We'll also look at the growing use of social login and how federated identities can be leveraged to simplify user access while maintaining security. By the end of this topic, you鈥檒l understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach depending on your organisational needs.

What's included

1 assignment12 plugins

As cyber threats grow more sophisticated, relying on a single password is no longer enough. This topic introduces you to the world of two-factor (2FA) and multi-factor authentication (MFA)鈥攌ey strategies in strengthening identity verification and reducing unauthorised access. You鈥檒l explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods such as memorised secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We鈥檒l also critically evaluate the strengths and limitations of each approach鈥攊ncluding whether biometrics truly offer a foolproof solution. By the end of this topic, you鈥檒l be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.

What's included

1 assignment10 plugins

Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You鈥檒l explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We鈥檒l also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations. By the end of this topic, you鈥檒l not only understand the risks鈥攜ou鈥檒l gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.

What's included

1 assignment7 plugins

As cyber threats evolve, so must our approach to authentication. Traditional passwords are increasingly vulnerable and difficult to manage鈥攂oth for users and IT teams. In this topic, we explore the emerging world of passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You鈥檒l learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider whether these approaches can truly replace passwords. We鈥檒l also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you鈥檒l understand how to design and implement passwordless solutions that enhance security and user experience.

What's included

1 reading1 assignment6 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
10 Courses544 learners

Offered by

Explore more from Computer Security and Networks

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."
糖心vlog官网观看 Plus

Open new doors with 糖心vlog官网观看 Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions