graduated students

Introduction to Cybersecurity - Identity and Access Management (IAM)

Study networks and system security with Africa’s best online course. Learn TCP/IP, firewalls, VPN, Linux/Windows hardening, SIEM, and incident response also get a Certificate

Beginner

No prior experience

Certificate

Earn verified Certificate

Flexible

Learn at your pace

Accredited by ASIC (Accreditation Service for International Schools, Colleges, and Universities)

ASIC logo

GSV CUP ELITE 200. World's most innovative Edtech startups '23

GSVCup logo

Course Overview

Study networks and system security with Africa’s best online course. Learn TCP/IP, firewalls, VPN, Linux/Windows hardening, SIEM, and incident response also get a Certificate

$30.00

$42.00

  • Lifetime access to the program
  • Nano - Diploma Certificate
  • Learn at your own pace
  • Access on any device
Enroll now

Course Curriculum

What You Will Learn

Digital Skills Readiness

Module 1

IAM Foundations

Module 2

Authorization & Access Control

Module 3

IAM Solutions & Best Practices

Module 4

Module 1: Digital Skills Readiness

  • Intro to Workplace Skills for Career Success

  • Introduction

  • Understanding Computer and Digital Basics

  • Understanding Digital Tools

  • The Internet and Online Workspaces

  • Digital Literacy as Power

  • Digital Tools for Everyday Work

  • Simple Excel Functions

At the end of this course, you'll be able to...

The core concepts of identification, authentication, authorization, and accountability

Different authentication methods such as passwords, multi-factor authentication (MFA), biometrics, single sign-on (SSO), and federated identity management

Key access control models — including DAC, MAC, RBAC, and ABAC — and how to apply the Least Privilege Principle

Practical user and group management, plus strategies for securing privileged accounts through Privileged Access Management (PAM)

Industry-leading IAM solutions like Okta and Microsoft Azure AD, and how they’re deployed in real-world organizations

Best practices for policy development, enforcement, auditing, monitoring, and user awareness to maintain strong IAM governance

By the end of the program, you’ll be able to design, evaluate, and implement IAM strategies that strengthen security and protect critical digital assets

ilustration

Earn a Recognized Certificate

Upon completing this course, you’ll receive a verified certificate to showcase your skills. This certificate can be added to your portfolio, LinkedIn profile, or resume, helping you stand out to employers and clients. Gain industry-recognized credentials and take a step toward your professional growth!

certificate

Frequently asked questions

Got Questions? We've Got Answers!

More questions?

We're always ready to help you out.

avatars
Contact support