Master the management of identities and accesses:
Protect your systems while ensuring security
optimal thanks to our training in IAM.

Eligible CPF and multi-financing up to 100%

To be recalled Access to the programme

Approach 3P

Ready to take off
Full immersion
Ready to perform

Our training centre guides you in identifying the ideal training, helping you maximize funding opportunities.
We put all the keys in hand for a start with confidence.

Experience an immersive and intensive training experience, designed to dive into practical workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.

At the end of your career, we evaluate your acquired skills, issue certification attesting to your expertise, and accompany you to ensure your success in your professional projects.
You are now ready to excel!

Description of the training

Master the management of identities and accesses: protect your systems while guaranteeing optimal security thanks to our training in IAM!

Objectives of training

At the end of this training, participants will be able to:

  • Understanding the Fundamentals of Identity and Access Management (IAM).
  • Implement authentication and access management solutions in different environments (on-site and cloud).
  • Manage identities and access in a secure and regulatory manner (GDPR, ISO 27001, etc.).
  • Apply access control strategies, such as role-based access control (RBAC) and multi-factor authentication (MFA).
  • Establish access monitoring and audit systems to detect anomalies and ensure the security of sensitive information.
  • Navigate through good identity and access governance practices as part of compliance and risk management processes.
  • Secure cloud and hybrid environments with solutions adapted to new business architectures.


Who is this training for?

The training is aimed at a wide audience, including:

  • Security Officers (RSSI, CISO) wishing to understand the issues of identity management and access in their company.
  • System administrators and networks responsible for managing access to IT resources.
  • IT project managers, cybersecurity or digital transformation consultants, who want to deepen their knowledge of identity management.
  • Security engineers involved in the implementation of IAM (Identity and Access Management) solutions.
  • Cloud developers or architects to integrate access management solutions into local or cloud environments.
  • Listeners or compliance managers wishing to become familiar with regulations related to identity management (GDPR, ISO 27001, etc.).

Prerequisites

No specific prerequisites are required.


Training programme

  • Introduction to Identity and Access Management
  • Basic concepts of the IAM
  • Architecture and key components of the IAM
  • Authentication protocols (SSO, MFA, etc.).
  • Implementation of an IAM solution (AD, Azure AD, Okta)
  • Managing identities and access in an organization
  • Creation and management of roles
  • Access rights and permissions.
  • Access security and access control
  • Strong authentication (MFA)
  • Preferential Access Management (PAM)
  • Access Security Policy and Zero Trust.
  • Access governance and audit
  • Monitoring and management of audit logs
  • Access management in cloud and hybrid environments
  • Monitoring and audit tools (SIEM).
  • Governance, compliance and good practices
  • Governance models and good practices
  • Compliance with regulations (GDPR, ISO, etc.)
  • Audit and control process
  • Implementation of concepts studied in real cases
  • Practical workshop and case studies: putting concepts into practice on real cases, discussions on setting up an IAM solution in complex architectures.


Training assets

  • Pedagogical approach: An alternative between theory and practice for better assimilation of concepts.
  • Qualified speakers: Specialist trainers with practical experience in the field of identity management and access.
  • Educational tools and materials: Access to online resources, live demonstrations and real-life case studies.
  • Accessibility: Training is open to all, without advanced technical prerequisites.


Pedagogical methods and tools used

  • Live Demonstrations: Interaction with Identity Management Services in the Cloud.
  • Practical workshops and real case studies: Application of concepts in various sectors.
  • Feedback: Sharing best practices and common mistakes in business.
  • Simulations and tools: Using Cloud simulators and platforms for interactive workshops.


Evaluation

  • MCQ at the end of training.
  • Practical case studies.
  • Continuous evaluation with personalized feedback.


Normative References

  • Well-Architected Cloud Providers Framework
  • ISO/IEC 19086
  • GDPR (General Data Protection Regulation)
  • NIST Cloud Computing Standards (SP 500-292)
  • ISO 27001 Information Security: Guarantees data security in cloud environments while monitoring and managing costs

Modalities

Inter-company or remote
Intra-enterprise

Inter-company or remote

Duration:3 days

Price:€2700

More details Contact us

Intra-enterprise

Duration and program can be customized according to your company's specific needs

More details Contact us
💬
FAQ Assistant