Identity management: training, course, overview of offers and providers

to providers
(1)
Infos, tips & tests Video stories
(1)

Are you looking for a professional development opportunity through identity management training to acquire knowledge about identity management?

You've come to the right place to find comprehensive information, tips and answers. Click quickly and easily on the "Free information on the topic..." button next to the desired provider and receive further information or personal advice - quickly, easily and without obligation.

Download checklists

Checklist «Finding the right further training» » download here

Checklist «Choosing the right school» » download here

Identity Management Training: Access control with identity management through identification of individuals

Identity management (IdM for short) is the targeted handling of identity and (pseudo-)anonymity through identification. In the IT sector, it is an administrative area that deals with the identification of individuals in a system. This controls access to a resource within this system by comparing user rights and restrictions with the defined identity. Identity management also includes access management for mobile devices to the company network. The identity management applications run on a dedicated network or server via On Promise or in the cloud. In addition to security, this also increases productivity and reduces costs and the effort required for other security measures.

Identity management training explains the possibilities in identity management for identifying individuals in a system. It provides an overview of access management and data security for organizations or networks. Identity management training can include the following topics:

  • Introduction, basics and concepts
  • Cross-system administration of users, groups, accounts, authorizations and roles
  • Password management, password self-service
  • Application and approval processes
  • Ensure access security to user accounts
  • Control and execute simple authorizations
  • Implementing and designing an Identiy Manager solution
  • Using and installing Identity Management Designer
  • Install user application
  • Configure and implement password synchronization
  • Manage and configure policies and filters
  • Administrative tasks and basic self-service
  • Configure and implement drivers
  • How single sign-on works
  • SSO in the company: Kerberos
  • Certificates of a Public Key Infrastructure (PKI)
  • SAMLv2
  • OAUTH
  • DM2, XDS and IDM2 / VRTest
  • Troubleshooting

The Identity Management courses are aimed at system engineers, system architects, project managers and developers. Depending on the course, there are specific prerequisites - check these in advance. Graduates will be able to secure their organization or network through identity management and use it to manage access.

Would you like to help shape IT security in the area of identity management in the future and be familiar with the identification of individuals through identity management, access control and access management? On Ausbildung-Weiterbildung.ch you will find a selection of providers who offer courses, training, seminars or training for anti-hacking. Get the latest course information sent to you by e-mail as a PDF or by post.


Questions and answers

The most important identity management tools are identity and access management tools (IAM tools), i.e. tools with identification management and lifelong management of digital identities. The tools map the access authorizations of entire companies and ensure the company's own and external compliance guidelines. Important technologies are

  • Password management tools
  • Provisioning Software
  • Apps to enforce security policies
  • Monitoring / Reporting Apps
  • Identity repositories

IAM tools are available both for on-premise systems such as Microsoft SharePoint and for cloud-based systems such as Microsoft 365. In addition to commercial products, there are also open source identity management alternatives that involve lower investment costs.

As Identity Management Microsoft, Azure Active Directory (Azure AD) in particular is a proven tool - in the sense of Identity Management Azure. It is a complete solution for identity and access management. The integrated security of Azure AD protects companies with a seamless identity solution. Forefront Identity Manager is also a software product for government identity management. This identity management solution includes Microsoft identities, login credentials and user groupings.

Identity management is an administrative area for identifying individuals in a system. It controls access to resources within the system. This is done via user rights and restrictions. In identity management (IdM), these parameters are compared with the defined identity.

Identity management software operates as a kind of broker (i.e. on behalf of) between all individual systems that store personal data that identity management is supposed to reconcile. The software usually works as a process on dedicated hardware or software (such as an application within an application server). This software is referred to as an identity management system.

According to the Identity Management Wiki, the definition of identity management is the conscious and targeted handling of data:

  • Identity
  • Anonymity
  • Pseudo-anonymity

One example is the identity card as a form of identification prescribed by the state.

Identity management systems (IMS) refer to an information system and technologies for cross-company or cross-network identity management. Data such as directories, databases etc. are stored in the identity management systems. Important systems for companies are

  • Metadirectory: Directory service for storing personal employee data
  • Virtual Directory: Directory service for security architecture with IDs, attributes and other requirements (NDS, eDirectories, SAP systems, active directories) - in accordance with Identity Management in SAP
  • Data sources from application-specific databases, e-mail systems or HR department software
  • Identity management system as software
  • Identity and access management systems (IAM) for assigning a digital identity to individuals and maintaining, updating and monitoring it throughout the access lifecycle

Redaktionelle Leitung:

Stefan Schmidlin, Bildungsberatung, Content-Team Modula AG

Quellen

Website des Schweizerischen Sekretariats für Bildung, Forschung und Innovation SBFI , Website www.berufsberatung.ch (offizielles schweizerisches Informationsportal der Studien-, Berufs- und Laufbahnberatung) sowie Websites und anderweitige Informationen der Berufsverbände und Bildungsanbieter.


Erfahrungen, Bewertungen und Meinungen zur Ausbildung / Weiterbildung

Preview of the video «4 Schritte zur richtigen Weiterbildung»

Haven't found the right training or further education yet? Benefit from educational advice now!

Further training is not only important in order to maintain or increase professional attractiveness, investing in training or further training is still the most efficient way to increase the chances of a pay rise.

The Swiss education system offers a wide range of individual training and further education opportunities - depending on your personal level of education, professional experience and educational goals.

Choosing the right educational offer is not easy for many prospective students.

Which training and further education is the right one for my path?

Our education advisory team will guide you through the "education jungle", providing specific input and relevant background information to help you choose the right offer.

Your advantages:

You will receive

  • Suggestions for suitable courses, seminars or training programs based on the information you provide in the questionnaire
  • An overview of the different levels and types of education
  • Information about the Swiss education system

We offer our educational counseling in the following languages on request: French, Italian, English

Register now and concretize your training plans.

 


Sofort zur richtigen Weiterbildung

Filter by teaching method:
Blended Learning (0) Other (0)
Address:
Kronenstrasse 11
8735 St. Gallenkappel
ExperTeach AG
We support the ICT world with training, certification and consulting services. We offer courses from manufacturers such as Cisco or Trend Micro and in the field of IT management. With our own ExperTeach Networking seminar series, we provide you with technology know-how on all important ICT topics and current industry trends.
Region: Aargau, Basel, Bern, Liechtenstein, Ostschweiz, Tessin, Westschweiz, Zentralschweiz, Zürich
Sites: Zürich, Frankfurt/Dietzenbach, Wien, Düsseldorf, Hamburg, München

Schulen mit zertifizierter Bildungsberatung