Description

Background

Technology has become a crucial part of any industry. Due to the constant flow of information across the internet worldwide and the rise in security breaches, Access Management has become a highly sought-after resource for any business (or individual). It is central to any businesses’ operation that access to certain data is securely managed through access authorization. Utilization of the Access Management should never become inconvenient or cumbersome to the user. Through the completion of access management course, Managers and users alike will be skilled in handling Access Management professionally and securely according to their business needs.


Benefits

This Course will provide you with:

  • An understanding of the value of Access Management
  • Adequate support and confidentiality techniques to support your clients according to their user privileges
  • Knowledge of high Service Level Management
  • The capacity to implement ethical protocols for your Access Management system

Who Should Attend

A firm knowledge of Access Management will greatly aid any individual in a management or service related position. This includes Helpdesk staff, managers, consultants, supervisors and specialists in an array of fields, including the IT field. Individuals outside these fields will also benefit from this training, as their understanding of security, in this age of technology, will be immensely improved.


Curriculum

DAY ONE:

  • Virtual Structure of Organizations
  • User rights
  • Protocols and Policies
  • General Security Measures
  • Threats and risks

 

DAY TWO:

  • Managing Mobile Computing
  • Cloud Computing
  • Connected Devices
  • Social Media
  • Big Data

 

DAY THREE:

  • Data Loss and Theft
  • Privacy
  • Regulations
  • Identity Theft
  • Cyber Crime & Terrorism

 

DAY Four:

  • Strategy and Governance
  • Surveillance and Program Management
  • Lifecycle and Transformation
  • Access Request and Approval
  • Red flag rules and management

 

DAY FIVE:

  • Provisioning and De-Provisioning
  • Enforcement
  • Access Review and Certification
  • Account Reconciliation
  • Auditing user access
  • Reporting