![]() |
Identity And Access Management (iam)
![]() Identity And Access Management (iam) Published 4/2026 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 3h 2m | Size: 2.31 GB What you'll learn Build a complete enterprise IAM lab using Active Directory, Keycloak, and PKI on real VMs Configure SSO for multiple applications using OIDC with Keycloak as Identity Provider Implement RBAC, AD Delegation, and Tiered Administration to enforce least privilege Harden Active Directory by fixing ACL misconfigurations, stale accounts, and audit policies Deploy and manage gMSA, LAPS, Fine-Grained Password Policies, and RADIUS authentication Issue and manage digital certificates using AD Certificate Services and configure certificate-based login Detect and respond to real IAM security risks like Kerberoasting, orphaned accounts, and privilege escalation Requirements VMware or VirtualBox installed with Windows Server 2025, Windows 11, and Kali Linux VMs ready No prior IAM or cybersecurity experience needed - all concepts are taught from scratch Description • This course is a fully hands-on, lab-driven journey into enterprise Identity and Access Management (IAM). • You will build a real-world IAM architecture from scratch using Windows Server 2025, Windows 11, and Kali Linux - the exact stack used in modern IT and cybersecurity environments. • You will install and configure Active Directory, promote a Domain Controller, design OU structures, and manage the complete identity lifecycle using the Joiner-Mover-Leaver model. • You will write PowerShell scripts to automate bulk onboarding and offboarding, enforce security baselines using GPOs, and harden AD by fixing stale accounts and ACL misconfigurations. • On the authentication side, you will deep dive into Kerberos, NTLM, Fine-Grained Password Policies, RADIUS using NPS, and certificate-based login using AD Certificate Services. • You will configure gMSA for service accounts and implement a Tiered Administration model with proper RBAC and delegation. • For modern identity, you will deploy Keycloak on Docker and configure Single Sign-On for Nextcloud and Grafana using OIDC - so users log in once and access multiple applications seamlessly. • Every module is practical. Every concept is demonstrated in a live lab. • By the end, you will have a portfolio-ready IAM lab and the real skills to work as an IAM Engineer, AD Administrator, or Security Analyst. Who this course is for IT administrators who want to move into cybersecurity or IAM roles Cybersecurity students building hands-on lab skills Helpdesk and sysadmin professionals looking to upskill into identity and access management Anyone preparing for roles like IAM Engineer, AD Administrator, or Security Analyst Öèòàòà:
|
| ×àñîâîé ïîÿñ GMT +3, âðåìÿ: 14:27. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
Ïåðåâîä: zCarot