Menu:

Menu:


An Intensive 3-Day Training Course

IT Systems: Identity & Access Control

Tutor-Led Class @ NGN150,000.00 per Participant
Online @ NGN120,000.00 Per participant
On-Site to make formal request
Venue: Mechelectric Conference Centres, Ikeja, Abuja, PH and Ota
Date and Time: December 18 - 20, 2024; 0900Hr - 1600Hr Daily


Course Overview
We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks and telecommunications, just to name a few. We are no longer only vulnerable to attacks against valuable enterprises' digital content but also to life threatening attacks, terrorist attacks, espionage attacks, etc. The need for providing identity assurance and stringent access control, as a result, is of utmost importance. This course covers the fundamental principles and architecture framework for an end-to-end IT identity and access management system. This includes identity assurance, authentication, authorization, accountability, auditability, Single Sign-On (SSO) and identity federation. It also discusses practical case studies such as e-passport, mobile banking, e-government services, EMV systems and other selected cases.

Course Benefits
By attending this WorkmanSkills training, delegates will be able to:
  • Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options
  • Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate based authentication, device authentication, etc)
  • Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies
  • Explain the most well-known access control mechanisms and the roles of oauth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO
  • Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and boarder gate, mobile-banking, EMV scheme, and e-movement services)

Target Audience:
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

How will this Training Course be Presented?
This WorkmanSkills training course will utilize a variety of proven learning techniques to ensure maximum understanding, comprehension, and retention of the information presented. 

Course Outlines
  • Identity and access management (IAM) overview
  • Attributes of information security:
  • Confidentiality
  • Integrity
  • Availability
  • Non-repudiation
  • Accountability
  • Auditability
  • Symmetric and asymmetric cryptography
  • Hashing and digital signature
  • Key management
  • Architecture: certification and registration authority
  • Life cycle management
  • Types of certificates and usage patterns
  • Encryption
  • Digital signature
  • Client certificate
  • SSL server certificate
  • Attribute based certificate
  • Case studies (e.g. email protection, mobile banking, and document signing)
  • Identification, verification and authentication overview
  • Mechanisms of identification and authentication
  • One time password
  • Biometric
  • Digital signature
  • Smartcard
  • Soft/hard tokens
  • Mobile device
  • Risk based authentication
  • Step-up authentication
  • Single-sign on and federated single-sign-on
  • OATH, OpenID, BorwserID, and SAML
  • Architecture framework and industrial tools
  • Trusted computing role in identity assurance
  • Security risks associated with the discussed mechanisms
  • Principles of authorization
  • Access control schemes
  • OAuth protocol
  • Enterprise rights management and digital rights management
  • Privileged account management
  • Governance and compliance
  • IAM architecture framework
  • IAM echo system
  • IAM and cloud computing
  • Illustrative use cases
  • Border control
  • E-passport
  • National ID
  • E-banking
  • E-health system
  • EMV scheme

​The Certificate
WorkmanSkills Certificate of Completion will be provided to delegates who attend and complete the course

Example image - aligned to the left

Example image - aligned to the left

Example image - aligned to the left