Overview/Description Target Audience Expected Duration Lesson Objectives Course Number Overview/Description
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
This course is intended for IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services. The course outlines the benefits and downfalls of implementing or using services in a cloud and helps IT professionals determine what types of technology or services are suitable for cloud networks and how those services are hosted in a cloud computing environment.