View programs
Enterprises manage users and devices through a secured, functional, and reliable mechanism that controls access to data and information via applications and services in an enterprise’s computing environment. With skills gained in this course, you will be able to practice fundamental concepts of Identity and Access Management (IAM) and participate in the strategic, tactical, and operational level of IAM.
The practice of IAM, usually within an Information Security Management System (ISMS), is commonly designed and implemented based on the enterprise’s business needs and controls; the international security standard - ISO/IEC 27002 “Code of practice for information security controls”; and other suitable “270xx” families of ISO/IEC standards, industrial standards, frameworks, and regulatory requirements.
Graduates of this course will be able to describe the mechanisms required for IAM to manage and operate an Identity Lifecycle for all vetted identities and their access rights to enterprise assets.
Prior to enrolling in this course, it is recommended that you have a basic understanding of security concepts and access control mechanisms.
Note: Clicking on any of the following links will take you to the program of studies where you can obtain more information or choose additional courses for your shopping cart.
We are currently maintaining a waitlist for this course. If you would like your name added to the waitlist, please contact the Registration Call Centre at 905.721.3000.
Unfortunately, registration is no longer available for this course. Please check the upcoming semester or feel free to browse our website for other courses of interest. You may also click on the link above this course on the course detail page to be notified when a new class is added.
Course Filled to Capacity. Unfortunately, registration is no longer available for this course. Please check the upcoming intakes or feel free to browse our website for other courses of interest.