Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Cyber Security: Identity Access Management and Authentication

Macquarie University via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Cyber Security: Identity and Access Management (IAM) and Authentication | Design Trust. Control Access. Protect Everything. In an era where digital identity is at the centre of every security conversation, mastering Identity IAM is critical to protecting systems, data, and people. This course is your practical guide to building, managing, and securing authentication systems in modern enterprises. Own the Front Door of Enterprise Security Developed by Macquarie University’s Cyber Skills Academy, ranked in the top 1% of universities globally and recognised as Australia’s leading cyber security school, this course has been co-designed with industry partners to ensure every module reflects the realities of today’s threat landscape and workforce needs. From real-world case studies to implementation-ready tools, this course equips you with both the foundational knowledge and the technical skills to manage identity and access securely across cloud and on-prem environments. You’ll dive deep into: • IAM fundamentals and architecture design • Lifecycle processes like onboarding, provisioning, and recovery • Identity federation and Single Sign-On (SSO) • Two factor (2FA), multi-factor (MFA), and biometric authentication • Risk analysis, vulnerabilities, and threat mitigation in IAM systems • Modern passwordless authentication methods including FIDO2 and WebAuthn Secure Access, Everywhere Each topic has been carefully structured to move beyond theory, giving you hands-on, applicable knowledge that’s directly transferable to workplace environments. Whether you’re an IT professional, security leader, or aspiring IAM specialist, this course empowers you to confidently design and secure identity systems that protect organisations from evolving threats.

Syllabus

  • Introduction to Identity Access Management
    • In today’s digital world, managing who has access to what, and when is critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for everything to come in the course. You’ll explore the core components of the IAM ecosystem, learn how to talk about IAM in a business and technical context, and become familiar with the authentication methods commonly used across industries. We’ll also break down the elements of effective IAM architecture, giving you the tools to start designing access management systems based on specific organisational requirements. By the end of this topic, you’ll understand how IAM supports security and operations and be able to design a simple but effective IAM architecture tailored to real-world needs.
  • IAM Processes and Technologies
    • Effective identity and access management isn’t just about authentication, it’s about managing the entire user lifecycle. In this topic, you'll explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation.We’ll examine how these processes differ across cloud and on-premises environments, and dive into the limitations, compromises, and security trade-offs that come with each. You'll also learn how to configure selected IAM processes and adapt them to meet the needs of your organisation. By the end of this topic, you’ll have a clear understanding of how IAM processes support secure access at every stage of the user journey and how to implement them effectively in real-world environments.
  • Identity Federation
    • In a world of cloud services, multiple platforms, and growing user demands, seamless and secure access is more important than ever. This topic explores identity federation the practice of linking a user’s digital identity across systems and organisations to enable smoother and more secure authentication. You’ll learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We'll also look at the growing use of social login and how federated identities can be leveraged to simplify user access while maintaining security. By the end of this topic, you’ll understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach depending on your organisational needs.
  • Two Factor Authentication and Multi-Factor Authentication
    • As cyber threats grow more sophisticated, relying on a single password is no longer enough. This topic introduces you to the world of two-factor (2FA) and multi-factor authentication (MFA), key strategies in strengthening identity verification and reducing unauthorised access.You’ll explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods such as memorised secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We’ll also critically evaluate the strengths and limitations of each approach, including whether biometrics truly offer a foolproof solution. By the end of this topic, you’ll be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.
  • Risks, Vulnerabilities and Threats
    • Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You’ll explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We’ll also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations.By the end of this topic, you’ll not only understand the risks, you’ll gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.
  • Cryptography and Passwordless Authentication
    • As cyber threats evolve, so must our approach to authentication. Traditional passwords are increasingly vulnerable and difficult to manage, both for users and IT teams. In this topic, we explore the emerging world of passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You’ll learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider whether these approaches can truly replace passwords. We’ll also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you’ll understand how to design and implement passwordless solutions that enhance security and user experience.

Taught by

Matt Bushby

Reviews

Start your review of Cyber Security: Identity Access Management and Authentication

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.