IT networks are constantly facing threats from inside and outside the organizations. Traditional perimeter defenses can miss insider threats from the employees themselves, such as password leaks and fraud due to staff complacency, in addition to external outside threats such as zero-day attacks.
To limit the presence of these threats, many IT departments are using identity and access control solutions. The Identity and Access Management course will focus on issues related to granting and revoking privileges to access data or perform actions on systems. A primary focus is on identification, authentication, authorization, and accountability. It also includes information on how to prevent or mitigate access control attacks.