Identity, Presence, and Privacy
This course is intended for IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services. The course outlines the benefits and downfalls of implementing or using services in a cloud and helps IT professionals determine what types of technology or services are suitable for cloud networks and how those services are hosted in a cloud computing environment.
Please contact us for information about prerequisites.
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP’s responsibility to not only provide security but also a proper level of privacy.
Managing Identity in the Cloud
- recognize the need for identity and access management
- match the key operational areas involved in identity and access management to their descriptions
- recognize examples of cloud use cases that require IAM support from cloud service providers
- identify some key cloud federation considerations
- describe the characteristics of Single Sign-On
- match the challenges associated with the use Identity as a Service to the user group to which they apply
- classify the pros and cons of using IDaaS as an identity management solution
Cloud Security and Privacy
- describe the technical requirements a business must meet to take advantage of presence information
- match the main components of a presence service to its description
- identify the security requirements for presence
- describe the key privacy concerns in a cloud computing environment
- match the security measures to the phases of the data life cycle