Description
Background
Technology has become a crucial part of any industry. Due to the constant flow of information across the internet worldwide and the rise in security breaches, Access Management has become a highly sought-after resource for any business (or individual). It is central to any businesses’ operation that access to certain data is securely managed through access authorization. Utilization of the Access Management should never become inconvenient or cumbersome to the user. Through the completion of access management course, Managers and users alike will be skilled in handling Access Management professionally and securely according to their business needs.
Benefits
This Course will provide you with:
- An understanding of the value of Access Management
- Adequate support and confidentiality techniques to support your clients according to their user privileges
- Knowledge of high Service Level Management
- The capacity to implement ethical protocols for your Access Management system
Who Should Attend
A firm knowledge of Access Management will greatly aid any individual in a management or service related position. This includes Helpdesk staff, managers, consultants, supervisors and specialists in an array of fields, including the IT field. Individuals outside these fields will also benefit from this training, as their understanding of security, in this age of technology, will be immensely improved.
Curriculum
DAY ONE:
- Virtual Structure of Organizations
- User rights
- Protocols and Policies
- General Security Measures
- Threats and risks
DAY TWO:
- Managing Mobile Computing
- Cloud Computing
- Connected Devices
- Social Media
- Big Data
DAY THREE:
- Data Loss and Theft
- Privacy
- Regulations
- Identity Theft
- Cyber Crime & Terrorism
DAY Four:
- Strategy and Governance
- Surveillance and Program Management
- Lifecycle and Transformation
- Access Request and Approval
- Red flag rules and management
DAY FIVE:
- Provisioning and De-Provisioning
- Enforcement
- Access Review and Certification
- Account Reconciliation
- Auditing user access
- Reporting