Identity and Access Management

University Extension Course focused on Identity and Access Management, offering a comprehensive and practical view for professionals seeking to deepen their knowledge in identity security.

Identity and Access Management

In our University Extension course on Identity and Access Management, offered by the IAM Academy Continuing Education Center in an online format (EAD – Educação a distância), you will gain access to a comprehensive approach to this discipline. We will begin with the basic concepts, from the fundamentals of information security to the differentiation between access and identity, types of identities, and mapping 1 techniques. Following this, you will learn how to establish policies, manage identities, controls, and permissions, ensuring regulatory compliance and data security. 2 Furthermore, we will explore advanced practices, such as the application of the principle of least privilege for access control, covering authorization, authentication, and federation.

You will also master techniques for monitoring and controlling high-privilege access, reducing risks and strengthening data protection, with a focus on the architecture and types of privileged accounts. Finally, we will address efficient and secure strategies for customer identity management, emphasizing data protection and ensuring a reliable user experience.

Our main objective is to provide you with a comprehensive understanding of the key concepts of identity and access management, enabling you to learn the best market practices and apply them effectively in your professional daily life.

Course Curriculum

and Syllabus

Module 1 – Fundamentals of Cyber and Information Security

In this module, we will cover the core concepts of Cybersecurity and Information Security, along with best practices, and key ideas such as threats, attacks, and vulnerabilities. You will also learn how to identify what needs protection, how security can add significant value to business areas while protecting the organization, and how Identity Management fits into this landscape.

In these classes, we will explain why information security governance involves the structures and processes that ensure data protection is effectively managed and aligned with organizational goals. You’ll understand the importance of defining policies, responsibilities, and procedures to protect company data and systems, and how governance ensures security practices are integrated into daily operations, in line with business needs and regulatory compliance.

In this module, we’ll align key concepts and explain why identity management is essential for controlling user access to digital systems. We’ll explore the history of identity, its origins, the differences between access and identity, the types of identities, and how to map each of them.

In this module, we will explain how to establish solid policies and controls for managing identities, permissions, and ensuring regulatory compliance. You will also learn the processes and fundamentals for effectively managing user identities within an organization.

In these lessons, we’ll explore how to apply the principle of least privilege, controlling who accesses which resources and ensuring security at all levels. We’ll also cover authorization, authentication, and federation protocols. With this knowledge, you’ll be able to implement controls that ensure only authorized users can access necessary data and resources, protecting the organization from unauthorized access and security breaches.

This module covers best practices for controlling and monitoring high-privilege access to reduce risks and strengthen data protection. You’ll learn about the architecture and types of privileged accounts, inventory management of credentials, regular password rotation, continuous monitoring, access control, and lifecycle management. The goal is to reduce the risk of unauthorized access and strengthen your IT infrastructure’s defense against internal and external threats.

This module explores strategies for efficiently and securely managing customer identities while delivering a trustworthy user experience. We’ll discuss how protecting customer access data can enhance their experience on digital platforms. Topics include customer authentication, access permission management, and implementing security measures like multi-factor authentication and activity monitoring.

In this module, we’ll explain why detecting and responding to identity threats is vital in cybersecurity. You’ll learn how to monitor user activity to identify suspicious behavior that may indicate a breach. We’ll also discuss how to respond quickly to contain incidents and restore security. The module emphasizes the importance of combining technology with clear policies to protect identities and organizational data.

This module introduces the importance of applying the Zero Trust concept to identity management. We’ll discuss how this security approach challenges automatic trust in traditional systems and helps mitigate internal and external threats. You’ll learn how to start building a Zero Trust strategy to protect critical data and identities.

Building an effective IAM (Identity and Access Management) team and processes requires clearly defining roles and responsibilities, investing in ongoing training, and establishing well-defined procedures. This module will guide you on how to form a solid team and implement robust processes to manage identities and control access to critical resources.

To implement an effective IAM program that incorporates everything you’ve learned, it’s essential to develop a comprehensive and strategic plan. This includes identifying organizational goals, assessing security and compliance requirements, and outlining a clear action plan. In this module, we’ll teach you how to adopt a phased and measurable approach aligned with your organization’s needs—ensuring your strategy is also adaptable and ongoing as new challenges arise.

Important

Information

Enrollment

After purchasing the course, you must complete your enrollment. Only after your enrollment is confirmed will you gain full access to the course through our virtual learning environment.

To complete your enrollment, you’ll need to submit the required documentation so we can forward it to the Ministry of Education (MEC). Once your documents are received, you’ll be able to start the classes.

Virtual Learning Environment

Our virtual learning platform offers the flexibility to watch the modules as many times as you like, from anywhere and at any time.

At the end of each module, you’ll be guided through exercises to reinforce the content you’ve learned. After completing all modules, you’ll take a final exam on the platform to assess your knowledge and progress.

Certificate Issuance

Once you have completed all classes, passed the assessments, and successfully finished the University Extension Program in Identity and Access Management, you will receive a course completion certificate issued in partnership with Faculdade Focus, which is accredited by the Brazilian Ministry of Education (MEC).

We maintain a Technical-Scientific Cooperation Agreement with Faculdade Focus. The institution is responsible for developing the pedagogical project and managing academic activities for students, including issuing all related official documents.

Certificates are issued within 30 business days after course completion, providing official proof of your learning and acquired skills.

Enrollment Required Before Accessing the Course

Due to our partnership with Faculdade Focus, it is mandatory to submit your documentation for enrollment in the class. After your purchase, you will gain access to our learning platform, where you will receive instructions for submitting the required documents and signing the enrollment agreement.

Course Duration

Students will have access to the course for 12 months. The total course content amounts to 40 hours, plus reinforcement exercises at the end of each module.

Only after completing all course content will students be eligible to receive the official certificate of completion, recognized by the MEC.

Technical-Scientific Partner

CENES is the institution specialized in offering distance-learning university extension courses (EAD) and maintains a technical-scientific cooperation agreement with Faculdade Focus. Faculdade Focus is responsible for developing the pedagogical project and conducting all academic activities related to the students.

Information

Iniciar Agora!

Course Value

up to 12 installments of R$ 199.70

Note: If your company is seeking training for its team, check out our special conditions using the button below.

Receba

Seu Certificado!

Upon completing the course, you will be eligible to receive a course completion certificate issued by Faculdade Focus, in partnership with the IAM Academy Continuing Education Center. This certificate attests to your participation and successful completion of the training program.

The certificate will be issued within 30 business days after course completion, providing an official record of your learning and the skills you have acquired. It serves as tangible proof of your commitment to professional development and can be a significant advantage on your resume. With the certificate in hand, you can highlight your qualification in the field and demonstrate your expertise to potential employers, clients, or business partners. Don't miss the opportunity to obtain this official recognition and boost your career in the area of information security.

Perguntas

Frequentes

Posso realizar pagamento com cartão?

Sim! Nossa plataforma de pagamento vai te dar listar as opções de pagamento. Você poderá escolher a melhor forma pra você.

Para pagamento com cartão de crédito, você pode escolher pagar com seu cartão do Mercado Pago ou com cartão de outros bancos.

Caso prefira cartões de outros bancos, escolha a opção “Novo cartão”. Na próxima tela você deverá informar os dados do cartão e clicar em “continuar”. Na tela seguinte deverá informar os dados do responsável pelo cartão. E na última tela deverá informar a quantidade de parcelas que deseja. 

Sim! Só escolher a opção “Com dois cartões” no menu de pagamento e seguir o processo de pagamento.

Primeiro você informará o valor a ser pago com o primeiro cartão, os dados do primeiro cartão junto com os dados do responsável por ele e quantidade de parcelas. 

Depois informará o valor a ser pago com o segundo cartão, os dados do segundo cartão junto as informações do responsável por ele e a quantidade de parcelas.

Sim! Basta escolher a opção “boleto bancário”. Na tela seguinte você deverá informar seus dados e clicar em “pagar” para que o boleto possa ser gerado de forma automática.

Não, não aceitamos pagamento em boleto parcelado.

Veja Mais

Cursos IAM Academy

The Professional Course on Segregation of Duties (SoD - Segregation of Duties) is a unique opportunity for individuals looking to...

University Extension Course focused on Identity and Access Management, offering a comprehensive and practical view for professionals seeking to deepen...

Curso de Extensão Universitária focado em Gestão de Identidades e Acessos, oferecendo uma visão abrangente e prática para profissionais que...

Se Inscreva para

Iniciar

Agora!

Se ainda tem dúvidas sobre o curso, entre em contato com a nossa equipe através dos nossos canais de comunicação.

Abrir Whatsapp
1
Whatsapp IAM Academy
Olá
Podemos ajudá-lo?