[MULTI] Identity And Access Management (iam)

jinkping5

U P L O A D E R
fd6a95cf94138571d1e8a3dae5e581c8.jpg

Identity And Access Management (iam)
Published 4/2026
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 3h 2m | Size: 2.31 GB​
Build a real enterprise IAM lab using Active Directory, Keycloak, PKI, RBAC, SSO, and PowerShell on Windows Server 2025
What you'll learn
Build a complete enterprise IAM lab using Active Directory, Keycloak, and PKI on real VMs
Configure SSO for multiple applications using OIDC with Keycloak as Identity Provider
Implement RBAC, AD Delegation, and Tiered Administration to enforce least privilege
Harden Active Directory by fixing ACL misconfigurations, stale accounts, and audit policies
Deploy and manage gMSA, LAPS, Fine-Grained Password Policies, and RADIUS authentication
Issue and manage digital certificates using AD Certificate Services and configure certificate-based login
Detect and respond to real IAM security risks like Kerberoasting, orphaned accounts, and privilege escalation
Requirements
VMware or VirtualBox installed with Windows Server 2025, Windows 11, and Kali Linux VMs ready
No prior IAM or cybersecurity experience needed - all concepts are taught from scratch
Description
• This course is a fully hands-on, lab-driven journey into enterprise Identity and Access Management (IAM).
• You will build a real-world IAM architecture from scratch using Windows Server 2025, Windows 11, and Kali Linux - the exact stack used in modern IT and cybersecurity environments.
• You will install and configure Active Directory, promote a Domain Controller, design OU structures, and manage the complete identity lifecycle using the Joiner-Mover-Leaver model.
• You will write PowerShell scripts to automate bulk onboarding and offboarding, enforce security baselines using GPOs, and harden AD by fixing stale accounts and ACL misconfigurations.
• On the authentication side, you will deep dive into Kerberos, NTLM, Fine-Grained Password Policies, RADIUS using NPS, and certificate-based login using AD Certificate Services.
• You will configure gMSA for service accounts and implement a Tiered Administration model with proper RBAC and delegation.
• For modern identity, you will deploy Keycloak on Docker and configure Single Sign-On for Nextcloud and Grafana using OIDC - so users log in once and access multiple applications seamlessly.
• Every module is practical. Every concept is demonstrated in a live lab.
• By the end, you will have a portfolio-ready IAM lab and the real skills to work as an IAM Engineer, AD Administrator, or Security Analyst.
Who this course is for
IT administrators who want to move into cybersecurity or IAM roles
Cybersecurity students building hands-on lab skills
Helpdesk and sysadmin professionals looking to upskill into identity and access management
Anyone preparing for roles like IAM Engineer, AD Administrator, or Security Analyst

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.in | Data-Load.ing

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist diese Webseite illegal?

Nein, data-load selbst ist nicht illegal. Die Plattform speichert keinerlei Dateien auf eigenen Servern. Stattdessen veröffentlichen externe Nutzer in Eigenregie Download-Links, die auf sogenannte „Hoster" – also externe Filehoster-Dienste – verweisen. Diese Webseite stellt lediglich eine Übersicht dieser von Nutzern eingereichten Links bereit.
Oben Unten