Macquarie University
Identity Access Management (IAM) and Secure Authentication

Ce cours n'est pas disponible en Français (France)

Nous sommes actuellement en train de le traduire dans plus de langues.
Macquarie University

Identity Access Management (IAM) and Secure Authentication

Matt Bushby

Instructeur : Matt Bushby

Inclus avec Coursera Plus

Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
niveau DĂŠbutant

ExpĂŠrience recommandĂŠe

9 heures Ă  complĂŠter
Planning flexible
Apprenez Ă  votre propre rythme
Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
niveau DĂŠbutant

ExpĂŠrience recommandĂŠe

9 heures Ă  complĂŠter
Planning flexible
Apprenez Ă  votre propre rythme

CompĂŠtences que vous acquerrez

  • CatĂŠgorie : Multi-Factor Authentication
  • CatĂŠgorie : Key Management
  • CatĂŠgorie : OAuth
  • CatĂŠgorie : Cryptographic Protocols
  • CatĂŠgorie : User Accounts
  • CatĂŠgorie : User Provisioning
  • CatĂŠgorie : Threat Management
  • CatĂŠgorie : Authentications
  • CatĂŠgorie : Vulnerability Assessments
  • CatĂŠgorie : Azure Active Directory
  • CatĂŠgorie : Identity and Access Management
  • CatĂŠgorie : AWS Identity and Access Management (IAM)
  • CatĂŠgorie : Authorization (Computing)
  • CatĂŠgorie : Role-Based Access Control (RBAC)
  • CatĂŠgorie : Security Assertion Markup Language (SAML)
  • CatĂŠgorie : Single Sign-On (SSO)

DĂŠtails Ă  connaĂŽtre

Certificat partageable

Ajouter Ă  votre profil LinkedIn

RÊcemment mis à jour !

juin 2025

Évaluations

6 devoirs

EnseignĂŠ en Anglais

DĂŠcouvrez comment les employĂŠs des entreprises prestigieuses maĂŽtrisent des compĂŠtences recherchĂŠes

 logos de Petrobras, TATA, Danone, Capgemini, P&G et L'Oreal

Il y a 6 modules dans ce cours

In today’s digital world, managing who has access to what—and when—is critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for everything to come in the course. You’ll explore the core components of the IAM ecosystem, learn how to talk about IAM in a business and technical context, and become familiar with the authentication methods commonly used across industries. We’ll also break down the elements of effective IAM architecture, giving you the tools to start designing access management systems based on specific organisational requirements. By the end of this topic, you’ll understand how IAM supports security and operations—and be able to design a simple but effective IAM architecture tailored to real-world needs.

Inclus

1 devoir16 plugins

Effective identity and access management isn’t just about authentication—it’s about managing the entire user lifecycle. In this topic, you'll explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation. We’ll examine how these processes differ across cloud and on-premises environments, and dive into the limitations, compromises, and security trade-offs that come with each. You'll also learn how to configure selected IAM processes and adapt them to meet the needs of your organisation. By the end of this topic, you’ll have a clear understanding of how IAM processes support secure access at every stage of the user journey—and how to implement them effectively in real-world environments.

Inclus

1 devoir5 plugins

In a world of cloud services, multiple platforms, and growing user demands, seamless and secure access is more important than ever. This topic explores identity federation—the practice of linking a user’s digital identity across systems and organisations to enable smoother and more secure authentication. You’ll learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We'll also look at the growing use of social login and how federated identities can be leveraged to simplify user access while maintaining security. By the end of this topic, you’ll understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach depending on your organisational needs.

Inclus

1 devoir11 plugins

As cyber threats grow more sophisticated, relying on a single password is no longer enough. This topic introduces you to the world of two-factor (2FA) and multi-factor authentication (MFA)—key strategies in strengthening identity verification and reducing unauthorised access. You’ll explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods such as memorised secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We’ll also critically evaluate the strengths and limitations of each approach—including whether biometrics truly offer a foolproof solution. By the end of this topic, you’ll be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.

Inclus

1 devoir10 plugins

Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You’ll explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We’ll also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations. By the end of this topic, you’ll not only understand the risks—you’ll gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.

Inclus

1 devoir6 plugins

As cyber threats evolve, so must our approach to authentication. Traditional passwords are increasingly vulnerable and difficult to manage—both for users and IT teams. In this topic, we explore the emerging world of passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You’ll learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider whether these approaches can truly replace passwords. We’ll also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you’ll understand how to design and implement passwordless solutions that enhance security and user experience.

Inclus

1 devoir6 plugins

Obtenez un certificat professionnel

Ajoutez ce titre Ă  votre profil LinkedIn, Ă  votre curriculum vitae ou Ă  votre CV. Partagez-le sur les mĂŠdias sociaux et dans votre ĂŠvaluation des performances.

Instructeur

Matt Bushby
Macquarie University
4 Cours2 apprenants

Offert par

Macquarie University

En savoir plus sur Computer Security and Networks

Pour quelles raisons les Êtudiants sur Coursera nous choisissent-ils pour leur carrière ?

Felipe M.
Étudiant(e) depuis 2018
’Pouvoir suivre des cours à mon rythme à été une expérience extraordinaire. Je peux apprendre chaque fois que mon emploi du temps me le permet et en fonction de mon humeur.’
Jennifer J.
Étudiant(e) depuis 2020
’J'ai directement appliqué les concepts et les compétences que j'ai appris de mes cours à un nouveau projet passionnant au travail.’
Larry W.
Étudiant(e) depuis 2021
’Lorsque j'ai besoin de cours sur des sujets que mon université ne propose pas, Coursera est l'un des meilleurs endroits où se rendre.’
Chaitanya A.
’Apprendre, ce n'est pas seulement s'améliorer dans son travail : c'est bien plus que cela. Coursera me permet d'apprendre sans limites.’
Coursera Plus

Ouvrez de nouvelles portes avec Coursera Plus

Accès illimitÊ à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.

Faites progresser votre carrière avec un diplôme en ligne

Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne

Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires

Améliorez les compétences de vos employés pour exceller dans l’économie numérique

Foire Aux Questions