Online or onsite, instructor-led live Identity and Access Management (IAM) training courses demonstrate through interactive hands-on practice how to use IAM tools and techniques to manage user identities, enforce access policies, and secure digital resources.
Identity and Access Management (IAM) training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Cardiff onsite live Identity and Access Management (IAM) trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
Identity and Access Management (IAM) is also known as Identity Management or Access Control.
NobleProg -- Your Local Training Provider
Cardiff
Radisson Blu Hotel, Meridian Gate - Bute Terrace, Cardiff, united kingdom, CF10 2FL
The Radisson Blu Hotel in Cardiff city centre is the perfect hub for your Welsh adventure
Close to several public transportation options, our hotel in Cardiff puts the city centre at your fingertips. Catch a train or a bus at one of the nearby stations, or take the M4 motorway and drive wherever you want to go in Wales and beyond. For those flying into the city, the Cardiff International Airport is just a 30-minute drive from the hotel. You’ll find parking around the hotel at the John Lewis, St David’s II and NCP Pellet Street car parks, plus some parking at the hotel. Enjoy shopping and dining within walking distance of the hotel, and explore the colourful history of this thriving capital city.
The hotel is located on Bute Terrace providing easy access to the M4 at junction 32 only 6 km away.
The central train and bus station is located within a five-minute walk from the hotel.
Cardiff International Airport is located 24 km from the hotel and can be reached by bus, train or taxi.
WSO2 Identity Server is an open-source Identity and Access Management (IAM) solution designed to secure APIs, microservices, and web applications.
This instructor-led, live training (online or onsite) is aimed at intermediate-level IT professionals who wish to implement identity federation, single sign-on (SSO), and access control using WSO2 Identity Server.
By the end of this training, participants will be able to:
Install, configure, and manage WSO2 Identity Server.
Enable SSO, identity federation, and multi-factor authentication.
Integrate with LDAP, Active Directory, and third-party IdPs.
Design and enforce authentication and authorization workflows.
Format of the Course
Interactive lecture and discussion.
Hands-on use of WSO2 Identity Server in sample identity management scenarios.
Guided exercises focused on integration, authentication, and access control.
Course Customization Options
To request a customized training for this course based on your organization's environment or IAM architecture, please contact us to arrange.
This instructor-led, live training in Cardiff (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
Install and configure 389 Directory Server.
Understand the features and architecture of 389 Directory Server.
Learn how to configure the directory server using the web console and CLI.
Set up and monitor replication for high availability and load balancing.
Manage LDAP authentication using SSSD for faster performance.
Integrate 389 Directory Server with Microsoft Active Directory.
This instructor-led, live training in Cardiff (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
Set up and configure Active Directory.
Set up a domain and define access rights of users and devices.
Manage users and machines through Group Policies.
Control access to file servers.
Set up a Certificate Service and manage certificates.
Implement and manage services such as encryption, certificates, and authentication.
In this instructor-led, live training Cardiff (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server.
By the end of this training, participants will be able to:
Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
Have the necessary practice to deploy and manage their own authentication server.
This instructor-led, live training in Cardiff (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
Install and configure FreeIPA.
Manage Linux users and clients from a single central location.
Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
Enable Single Sign On authentication across all systems, services and applications.
This instructor-led, live training in Cardiff (online or onsite) is aimed at beginner-level to intermediate-level IT professionals and security analysts who wish to use IAM to manage and secure their digital identities and resources.
By the end of this training, participants will be able to:
Use IAM concepts and terminology to describe and analyze different identity and access scenarios and challenges.
Use IAM tools and technologies to implement and manage identity and access solutions for various platforms and environments.
Use IAM standards and protocols to integrate and interoperate different identity and access systems and services.
Use IAM best practices and frameworks to design and evaluate identity and access policies and processes.
This instructor-led, live training in Cardiff (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
Configure, integrate, and manage Okta.
Integrate Okta into an existing application.
Implement security with multi-factor authentication.
OpenLDAP is open source software for implementing the LDAP (Lightweight Directory Access Protocol), which allows management and access to information directories. Jest is a popular directory server that can be used to store and share data about users, groups, network resources and other objects on the network.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
Understand the structure and operation of LDAP directories.
Install and configure OpenLDAP for various deployment environments.
Implement access control, authentication, and replication mechanisms.
Use OpenLDAP with third-party services and applications.
This instructor-led, live training in Cardiff (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
Access and manage authentication, authorization, and identity services through REST APIs.
This instructor-led, live training in Cardiff (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
Install and configure OpenDJ.
Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
This instructor-led, live training in Cardiff (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently, including digital certificates, encryption, and CSCA standards.
By the end of this training, participants will be able to:
Design, deploy, and manage a secure PKI system.
Evaluate cryptographic techniques and algorithms used in PKI.
Understand and implement CSCA standards for national and international document security.
Secure digital communications and storage using PKI-enabled technologies.
Read more...
Last Updated:
Testimonials (3)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it.
He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.
Dennis Barela
Course - OpenLDAP Workshop
Provisional Upcoming Courses (Contact Us For More Information)
Online Identity and Access Management training in Cardiff, Identity Management training courses in Cardiff, Weekend Identity and Access Management courses in Cardiff, Evening Identity and Access Management (IAM) training in Cardiff, Identity and Access Management (IAM) instructor-led in Cardiff, Identity and Access Management instructor-led in Cardiff, Identity and Access Management (IAM) on-site in Cardiff, Weekend IAM (Identity and Access Management) training in Cardiff, Online IAM (Identity and Access Management) training in Cardiff, IAM trainer in Cardiff, Identity Management classes in Cardiff, IAM one on one training in Cardiff, Evening Identity Management courses in Cardiff, Identity and Access Management boot camp in Cardiff, IAM coaching in Cardiff, IAM (Identity and Access Management) private courses in Cardiff, Identity Management instructor in Cardiff