Course AWR-351-W

Web-based Training (Self-Paced)

Zero Trust: Identity and Access Management (IAM)

Length
0 h

About Course

The intent of this course is to increase the learners’ understanding of Zero Trust methodology, principles, and implementation. The goal of this course is to prepare organizations to face existing threats and adapt to new threats in the future.

This course addresses concepts related to Zero Trust and Identity and Access Management. Some of the topics covered include:

  • the shift from perimeter-based security to Zero Trust;
  • the core principles of a Zero Trust reference architecture;
  • the basic tenets of a Zero Trust reference architecture;
  • the foundations, key principles, logical components, the key benefits of a Zero Trust reference architecture; and
  • Zero Trust implementation.

Students will learn different forms of access control and their usages in practice, as well as the overall concept of zero trust.

There are no prerequisites for this course.

Objectives

Upon successful completion of this course, participants will be able to:

  • understand the main goals, core principles, and basic tenets of a Zero Trust reference architecture
  • understand the foundations, key principles, logical components, the key benefits of a Zero Trust reference architecture, and the CISA Zero Trust maturity model
  • understand the important aspects of a successful Zero Trust implementation

Target Audience

Anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding access to digital resources and services. This course is also beneficial for non-decision and policymakers. Participants may be from disciplines including: critical infrastructure managers, local government and private sector management, policymakers, emergency management, information security and cybersecurity personnel and managers. Individuals targeted include those whose official duties are part of the strategic planning process associated with successful agency/organizational operation, data integrity and data security.

Prerequisites

Register

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Contact

CfIA (Memphis)

Email

cfia@memphis.edu

Phone

(901) 678-4271

Website

http://memphis.edu/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Contact

CfIA (Memphis)

Email

cfia@memphis.edu

Phone

(901) 678-4271

Website

http://memphis.edu/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list