Course Curriculum
and Syllabus
Module 1 – Fundamentals of Cyber and Information Security
- Instructor: Luiz Milagres
In this module, we will cover the core concepts of Cybersecurity and Information Security, along with best practices, and key ideas such as threats, attacks, and vulnerabilities. You will also learn how to identify what needs protection, how security can add significant value to business areas while protecting the organization, and how Identity Management fits into this landscape.
Module 2 – Introduction to Information Security Governance
- Instructor: Jefferson Souza
In these classes, we will explain why information security governance involves the structures and processes that ensure data protection is effectively managed and aligned with organizational goals. You’ll understand the importance of defining policies, responsibilities, and procedures to protect company data and systems, and how governance ensures security practices are integrated into daily operations, in line with business needs and regulatory compliance.
Module 3 – Introduction to Identity Management and Key Concepts
- Instructor: Micaella Ribeiro
In this module, we’ll align key concepts and explain why identity management is essential for controlling user access to digital systems. We’ll explore the history of identity, its origins, the differences between access and identity, the types of identities, and how to map each of them.
Module 4 – Identity Governance and Administration (IGA)
- Instructor: Micaella Ribeiro
- Instructor: Alfredo Santos
In this module, we will explain how to establish solid policies and controls for managing identities, permissions, and ensuring regulatory compliance. You will also learn the processes and fundamentals for effectively managing user identities within an organization.
Module 5 – Access, Authentication and Authorization Management (AM)
- Instructor: Raphael Saraiva
In these lessons, we’ll explore how to apply the principle of least privilege, controlling who accesses which resources and ensuring security at all levels. We’ll also cover authorization, authentication, and federation protocols. With this knowledge, you’ll be able to implement controls that ensure only authorized users can access necessary data and resources, protecting the organization from unauthorized access and security breaches.
Module 6 – Non-Human Accounts and Privileged Access Management (PAM)
- Instructor: Natalian Silva
- Instructor: Bruno Tarasco
This module covers best practices for controlling and monitoring high-privilege access to reduce risks and strengthen data protection. You’ll learn about the architecture and types of privileged accounts, inventory management of credentials, regular password rotation, continuous monitoring, access control, and lifecycle management. The goal is to reduce the risk of unauthorized access and strengthen your IT infrastructure’s defense against internal and external threats.
Module 7 – Customer Identity and Access Management (CIAM)
- Instructor: Daniel Ortiz
This module explores strategies for efficiently and securely managing customer identities while delivering a trustworthy user experience. We’ll discuss how protecting customer access data can enhance their experience on digital platforms. Topics include customer authentication, access permission management, and implementing security measures like multi-factor authentication and activity monitoring.
Module 8 – Identity Threat Detection and Response (ITDR)
- Instructor: Rodrigo Medina
In this module, we’ll explain why detecting and responding to identity threats is vital in cybersecurity. You’ll learn how to monitor user activity to identify suspicious behavior that may indicate a breach. We’ll also discuss how to respond quickly to contain incidents and restore security. The module emphasizes the importance of combining technology with clear policies to protect identities and organizational data.
Module 9 – Zero Trust for Identities
- Instructor: Divina Vitorino
This module introduces the importance of applying the Zero Trust concept to identity management. We’ll discuss how this security approach challenges automatic trust in traditional systems and helps mitigate internal and external threats. You’ll learn how to start building a Zero Trust strategy to protect critical data and identities.
Module 10 – Structuring IAM Teams and Processes
- Instructor: Davi Albergaria
Building an effective IAM (Identity and Access Management) team and processes requires clearly defining roles and responsibilities, investing in ongoing training, and establishing well-defined procedures. This module will guide you on how to form a solid team and implement robust processes to manage identities and control access to critical resources.
Module 11 – Strategy for Implementing an IAM Program
- Instructor: Cesar Telles
To implement an effective IAM program that incorporates everything you’ve learned, it’s essential to develop a comprehensive and strategic plan. This includes identifying organizational goals, assessing security and compliance requirements, and outlining a clear action plan. In this module, we’ll teach you how to adopt a phased and measurable approach aligned with your organization’s needs—ensuring your strategy is also adaptable and ongoing as new challenges arise.
Important
Information
Enrollment
After purchasing the course, you must complete your enrollment. Only after your enrollment is confirmed will you gain full access to the course through our virtual learning environment.
To complete your enrollment, you’ll need to submit the required documentation so we can forward it to the Ministry of Education (MEC). Once your documents are received, you’ll be able to start the classes.
Virtual Learning Environment
Our virtual learning platform offers the flexibility to watch the modules as many times as you like, from anywhere and at any time.
At the end of each module, you’ll be guided through exercises to reinforce the content you’ve learned. After completing all modules, you’ll take a final exam on the platform to assess your knowledge and progress.
Certificate Issuance
Once you have completed all classes, passed the assessments, and successfully finished the University Extension Program in Identity and Access Management, you will receive a course completion certificate issued in partnership with Faculdade Focus, which is accredited by the Brazilian Ministry of Education (MEC).
We maintain a Technical-Scientific Cooperation Agreement with Faculdade Focus. The institution is responsible for developing the pedagogical project and managing academic activities for students, including issuing all related official documents.
Certificates are issued within 30 business days after course completion, providing official proof of your learning and acquired skills.
Enrollment Required Before Accessing the Course
Due to our partnership with Faculdade Focus, it is mandatory to submit your documentation for enrollment in the class. After your purchase, you will gain access to our learning platform, where you will receive instructions for submitting the required documents and signing the enrollment agreement.
Course Duration
Students will have access to the course for 12 months. The total course content amounts to 40 hours, plus reinforcement exercises at the end of each module.
Only after completing all course content will students be eligible to receive the official certificate of completion, recognized by the MEC.
Technical-Scientific Partner
CENES is the institution specialized in offering distance-learning university extension courses (EAD) and maintains a technical-scientific cooperation agreement with Faculdade Focus. Faculdade Focus is responsible for developing the pedagogical project and conducting all academic activities related to the students.