Course Information
Course Overview
An In depth and advanced industrial implementations based use cases on Access Manager[unofficial][2024-25]
Identity and Access management is an important part of cyber security.
This is the 2nd part of the course, and mainly designed for them who had successfully implemented the first part and made there basics string from there.
Here the complete focus will be learning advanced features of Access Manager like Web Protection, MFA, REST APIs, Access Controls, Authorization etc.
The training program assumes that candidate have all prerequisite already setup to learn this part , as discussed in previous part of the course.
Also please go through per session until you are not clear with the implementations before proceeding further.
Wish you all the best.
Topic Covered:
Introduction
Protecting Application on J2EE Server
Understanding Use Case and Application Server
MVC Architecture
Application Server Configuration
Java Agent and Architecture
Java Agent Configuration, testing the protection & cookie analysis
Modules and Chain in Access Management
Introduction to Modules and Chain
various Module Criteria and Flags
Authentication Level and it's role in AM
Various Authentication Modules
MFA(Multi factor Authentication) using Chain [with use case]
Implementing MFA using chain
Adaptive or Smart or Extended MFA with modules and chain use case
Adaptive MFA with modules and chain
Authentication Tree
Introduction to Tree
Types of Nodes
Creating simple login tree
Tree to lock user anonymous login
Implementing MFA using Tree
Adaptive or Extended MFA using Tree
OpenAM REST API For Authentication
Introduction to REST API and Postman
OpenAM REST API Practical
Rest API Problem and Solution
Course Content
- 9 section(s)
- 21 lecture(s)
- Section 1 Introduction to Course
- Section 2 Protecting Application on J2EE Server
- Section 3 Modules and Chain in Access Management
- Section 4 MFA(Multi factor Authentication) using Chain [with use case]
- Section 5 Adaptive or Smart or Extended MFA with modules and chain use case
- Section 6 Authentication Tree
- Section 7 Implementing MFA using Tree
- Section 8 Adaptive or Extended MFA using Tree
- Section 9 OpenAM REST API For Authentication
What You’ll Learn
- Understanding Java Agent 2024..
- Configuring java agent Profile
- Protecting application on App server
- Understanding Modules
- Various authentication modules and features
- Understanding Chain
- Implement MFA[Multi Factor Authentication] using chain
- Authentication node
- Advanced Authentication Tress
- Looping one tree within tree
- Implementing MFA using Tree
- Adaptive MFA
- Adaptive Risk Module
- REST API end point for Access Manager
- Cyber Security
Skills covered in this course
Reviews
-
DDeepali R Anvekar
The basic topics were very well explained but I need videos on more advance topics like OAuth SAML etc where can I get it?
-
NNikhil Karn
Very less and basic content, and it looked like some demo videos...in order to get all the courses need to mail the trainer. The best thing could be to upload new course with all the content.
-
DDebanjan Mitra
This guy is totally unprofessional. If you are teaching something and students are buying the course. Give them atleast the presentation slides, so that it can referenced later.
-
MMohammad Shaik
The IAM fundamentals are very clear from the training, and great content. some of the topics are stretched too long which can be reduced