Course details
Seminar content
What you will learn
Why Attend
We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks and telecommunications, just to name a few. We are no longer only vulnerable to attacks against valuable enterprises' digital content but also to life threatening attacks, terrorist attacks, espionage attacks, etc. The need for providing identity assurance and stringent access control, as a result, is of utmost importance. This course covers the fundamental principles and architecture framework for an end-to-end IT identity and access management system. This includes identity assurance, authentication, authorization, accountability, auditability, Single Sign-On (SSO) and identity federation. It also discusses practical case studies such as e-passport, mobile banking, e-government services, EMV systems and other selected cases
Course Methodology
This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises and role playing that allow all participants to use the knowledge they gained to demonstrate their skills in identity and access management.
Course Objectives
By the end of the course, participants will be able to:
- Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options
- Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate based authentication, device authentication, etc)
- Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies
- Explain the most well-known access control mechanisms and the roles of oauth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO
- Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and boarder gate, mobile-banking, EMV scheme, and e-movement services)
Target Audience
This course has been designed for IT professionals such as IT Strategic Planners, Project Managers, Security Managers, Security Architects and Risk Managers.Although the course is technical in nature, complex concepts are discussed at an abstract level to fit the needs of participants from various technical backgrounds.
Target Competencies
- Information security management
- Impelementing public key infrastructure
- Identification and authentication management
- Identity Access Management (IAM)
Benefits
Why attend this seminar
- Build current, practical knowledge in security management.
- Translate the course ideas into actions you can use immediately at work.
- Review real schedule options across 10 venues and live dates.
- Connect course detail, venue, and category routes in one workflow.
Methodology
How the course is delivered
- Structured seminar input and guided discussion.
- Applied examples using current business situations.
- Focused explanations based on the stored overview and outline.
- Clear next steps for implementation after the course.
Target audience
Who this is for
- Professionals responsible for security management.
- Managers, specialists, and team leads who need applied skills.
- Participants looking for a focused route into IT Systems: Identity and Access Management.
Seminar details
Detailed outline
Introduction and principles of information security:
- Identity and access management (IAM) overview
- Attributes of information security:
- Confidentiality
- Integrity
- Availability
- Non-repudiation
- Accountability
- Auditability
- Symmetric and asymmetric cryptography
- Hashing and digital signature
- Key management
Public Key Infrastructure (PKI)
- Architecture: certification and registration authority
- Life cycle management
- Types of certificates and usage patterns:
- Encryption
- Digital signature
- Client certificate
- SSL server certificate
- Attribute based certificate
- Case studies (e.g. email protection, mobile banking, and document signing)
Identification and authentication
- Identification, verification and authentication overview
- Mechanisms of identification and authentication:
- One time password
- Biometric
- Digital signature
- Smartcard
- Soft/hard tokens
- Mobile device
- Risk based authentication
- Step-up authentication
- Single-sign on and federated single-sign-on
- OATH, OpenID, BorwserID, and SAML
- Architecture framework and industrial tools
- Trusted computing role in identity assurance
- Security risks associated with the discussed mechanisms
Access control
- Principles of authorization
- Access control schemes
- OAuth protocol
- Enterprise rights management and digital rights management
- Privileged account management
- Governance and compliance
IAM framework and use cases
- IAM architecture framework
- IAM echo system
- IAM and cloud computing
- Illustrative use cases:
- Border control
- E-passport
- National ID
- E-banking
- E-health system
- EMV scheme
Dates and locations
Available seminar dates
| Date | City | Duration | Price | |
|---|---|---|---|---|
| 6 - 10 April 2026 | Frankfurt - Germany | 5 Days | €3,250.- | Book now |
| 11 - 15 May 2026 | Rome - Italy | 5 Days | €4,250.- | Book now |
| 8 - 12 June 2026 | Kuala lumpur - Malaysia | 5 Days | €2,250.- | Book now |
| 6 - 10 July 2026 | Barcelona - Spain | 5 Days | €3,850.- | Book now |
| 10 - 14 August 2026 | London - U.K | 5 Days | €4,200.- | Book now |
| 14 - 18 September 2026 | Munich - Germany | 5 Days | €3,450.- | Book now |
| 5 - 9 October 2026 | Amsterdam - Netherlands | 5 Days | €4,250.- | Book now |
| 16 - 20 November 2026 | Istanbul - Turkey | 5 Days | €2,850.- | Book now |
| 7 - 11 December 2026 | Rome - Italy | 5 Days | €4,250.- | Book now |
| Date | Duration | Price | |
|---|---|---|---|
| 6 - 10 April 2026 | 5 Days | €2,250.- | Book now |
| 11 - 15 May 2026 | 5 Days | €2,250.- | Book now |
| 8 - 12 June 2026 | 5 Days | €2,250.- | Book now |
| 6 - 10 July 2026 | 5 Days | €2,250.- | Book now |
| 10 - 14 August 2026 | 5 Days | €2,250.- | Book now |
| 14 - 18 September 2026 | 5 Days | €2,250.- | Book now |
| 5 - 9 October 2026 | 5 Days | €2,250.- | Book now |
| 16 - 20 November 2026 | 5 Days | €2,250.- | Book now |
| 7 - 11 December 2026 | 5 Days | €2,250.- | Book now |
Course certificate
Certificate awarded on completion
Every participant who completes this seminar receives a professional course certificate from INFORAMTECH.
- Participants receive an INFORAMTECH certificate for completing IT Systems: Identity and Access Management.
- The certificate recognises attendance and successful participation in the seminar.
- It can support professional development records within security management and related functions.
Information about
Frequently asked questions
When is my seat confirmed?
Your seat is confirmed once full payment has been received.
Do you offer group discounts?
Yes, we offer the following discounts for group bookings:
- 2 participants: 20% discount
- 3 participants: 35% discount
- 5 or more participants: 50% discount
Can discounts be combined with other offers?
No, discounts cannot be combined unless explicitly stated.
What payment methods do you accept?
We accept bank transfers, credit/debit cards, and selected online payment methods.
When do I need to pay?
Full payment must be completed before the course start date to secure your participation.
Is VAT included in the course fee?
VAT treatment depends on your location and status:
- EU Companies (with valid VAT number): VAT may be reverse charged (0%)
- EU Individuals (without VAT number): VAT is applicable based on local regulations
- Non-EU Participants: VAT is generally not applicable (0%)
Can I get a VAT invoice?
Yes, all participants receive an official invoice. EU companies must provide a valid VAT number.
Can I cancel my registration?
Yes, cancellations must be submitted in writing.
What is your refund policy?
- More than 14 days before the course: Full refund
- 7-14 days before the course: 50% refund
- Less than 7 days before the course: No refund
Can I transfer my seat to another person?
Yes, substitutions are allowed at no extra cost if requested before the course start date.
What happens if the course is postponed or canceled?
We reserve the right to reschedule or cancel a course due to unforeseen circumstances. In such cases, you may:
- Transfer to another date
- Receive full refund
Will I receive a certificate?
Yes, all participants will receive a certificate of completion after attending the course.
Is attendance mandatory?
Yes, full attendance is required to receive certification.
Are your courses online or in-person?
We offer both in-person and virtual (live online) training options.
Will course materials be provided?
Yes, all participants receive training materials in digital format.
Are travel and accommodation included?
No, participants are responsible for their own travel and accommodation unless otherwise stated.
Can you deliver customized or in-house training?
Yes, we offer tailored training programs based on your organization's needs.
How can I contact you for support?
You can reach us via email info@inforamtech.uk or through our contact form. Our team will respond promptly.
Testimonials
The structure of IT Systems: Identity and Access Management made the topic practical and easy to apply immediately.
The venue and date options made planning the right session straightforward.
Clear content, relevant examples, and useful follow-up topics for the next training step.
Related courses
Course
Certificate in Supervising Security Operations (CSSO)
Course
Certificate in Security Management (CSM)
Course
Security Policies and Procedures
Course