IAM Courses
Identity Access Management Training Workshops
Embark on a comprehensive journey into Identity and Access Management (IAM) with our Keycloak training series. Our courses cater to various IAM needs, offering a roadmap for both beginners and seasoned professionals. Delve into the world of Keycloak server deployment and configuration, as we demystify OAuth 2, OpenID Connect, and JWT specifications. Gain a solid grasp of authentication terminologies, token intricacies, and best practices that have evolved over time.
Path to courses and workshops
Here is a summary of the courses and workshops in the IAM space.
Course 1: Basic Keycloak IAM & SSO
2 / 3 Days
Kickstart your IAM expertise with foundational Keycloak concepts.
Check out Course 1 details
Course 2: Advanced IAM
3 / 4 Days
Elevate your IAM skills with advanced Keycloak customization and integration techniques
Check out Course 2 details
Course 3: Advanced API Security
3 / 4 Days
Master the intricacies of API security within the IAM landscape.
Check out Course 3 details
Course 1: Basic Keycloak IAM & SSO
Kickstart your IAM expertise with foundational Keycloak concepts. This course covers:
Agenda
- Basic functionality exploration, with hands-on labs to tackle common configuration challenges.
- In-depth review of OIDC, OAuth 2.0, and JWT standards, addressing common misconceptions and implementation pitfalls.
- Designing authentication flows, including real-world scenarios to understand the challenges in creating user-friendly yet secure flows.
- Sign-in and sign-up use cases, with a focus on addressing common issues in user onboarding and authentication.
- Token customization insights, exploring the nuances of customizing tokens to meet specific business requirements.
- Deployment patterns discussion, covering challenges and best practices in deploying Keycloak in various environments.
- Hands-on demonstrations with troubleshooting scenarios to enhance problem-solving skills
Challenges to Solve
Navigate the challenges of implementing IAM solutions, from configuring basic functionality to designing authentication flows. Tackle issues in user onboarding, token customization, and deployment, ensuring a seamless IAM experience.
Target Audience
Ideal for IAM beginners and those seeking a solid understanding of Keycloak basics.
Course 2: Advanced IAM
Elevate your IAM skills with advanced Keycloak customization and integration techniques.
Agenda
- User Federation with LDAP, including troubleshooting common integration issues.
- Integration and troubleshooting of Identity Federation with external Identity Providers.
Implementation of Multifactor Authentication (MFA) and Passwordless experiences, addressing common challenges and ensuring seamless user experiences.
- Step-up authentication strategies, addressing scenarios where stronger authentication is required.
- Hands-on demonstrations with real-world problem-solving scenarios.
Challenges to Solve
Navigate complex IAM scenarios, from integrating external Identity Providers to implementing advanced authentication mechanisms. Address challenges in user federation, multifactor authentication, and step-up authentication to enhance your IAM capabilities.
Target Audience
Suitable for IAM professionals looking to deepen their Keycloak expertise and explore advanced IAM features.
Course 3: Advanced API Security
Master the intricacies of API security within the IAM landscape.
Agenda
- In-depth review of Authorization Models, addressing challenges in implementing and managing access control.
- Exploration of Authorization Architecture Components, focusing on practical solutions to enhance security.
- API security overview with OAuth 2.0, UMA, and addressing challenges in zero-trust architectures.
Challenges to Solve
With the growing importance of zero-trust architecture, based on the principle that nothing can be trusted, questions around the level of access granted have become critical. Security and compliance are mandatory problems to tackle in any architecture, and authorization is a crucial part of any solution, considering that the 2021 top OWASP risk was broken access control. Learn how to make authorization flexible, fast, and scalable to meet the evolving demands of modern security landscapes.
Target Audience
Designed for IAM and security professionals focusing on API security and microservices architecture.