Solutions Review has compiled the top identity management courses on Pluralsight for cybersecurity and IT professionals of all skill levels.

Your organization must ensure that only authorized users and employees have access to your systems at all times. Without the right tools and employee training, your business could be exposed to attacks from harmful actors – and these can be massive headaches for your business. Online courses and training are great resources for those looking to learn more about identity management.

With that in mind, the editors at Solutions Review have compiled this list of the best Pluralsight identity management courses for you to consider. This is not an exhaustive list, but rather one that includes the best courses and training available from this trusted online platform. This list of the top identity management courses on Pluralsight below has links to the modules and our opinion on each. The courses are not listed in any particular order.

Download link to the IAM buyers guide

The best identity management courses on Pluralsight

Course name: Identity and Access Management (IAM) for CISSP®

Our opinion: Anyone wishing to take the CISSP® exam must consider this course. Instructor Kevin Henry teaches you everything you need to know about identity and access management, including authentication, authorization, and accountability for security professionals.

“This course will help you understand the principles of one of the most important areas of information security – managing access to the organization’s assets – and help you prepare for the CISSP® exam. In this course, Identity and Access Management for the CISSP®, you will learn to design and manage an identity access program. First, you explore identification and authentication. Next, you’ll discover authorization. Finally, you will learn how to be accountable. After completing this course, you will have the identity and access management skills and knowledge required for the CISSP® exam.

GO TO TRAINING

Course name: Access control and identity management

Our opinion: Another course from Kevin Hendry. This Access Control and Identity Management training explains how you can control access to your systems through authentication, identity management, and security surveillance techniques.

“Access controls and identity management are at the heart of information security. In this course, Access Control and Identity Management, you will learn about the risks and challenges associated with access control concepts that a security professional must understand. First, you will discover the different access control attacks. You will then learn the methods for implementing and monitoring an access control system. Finally, you will learn about access control models and techniques. By the end of this course, you will know and understand the basics of information security – access control.

GO TO TRAINING

Course name: Identity and Access Management on AWS: Policies and Permissions

Our opinion: To learn all of the permissions and policies required for proper identity and access management and Amazon Web Services, including how to use the IAM Policy Simulator tool, consider this course, led by Brian Eiler.

“This course, Identity and Access Management on AWS: Policies and Permissions, teaches you how to choose the appropriate policy type, create and manage custom policies, and determine the effective policies for a particular scenario. First, you’ll learn what guidelines are and how they’re structured, as well as the different types available. Next, you’ll learn how to evaluate policies, including using the Policy Simulator tool to determine the exact policies that exist and from which permissions are granted or denied. Finally, you will learn how to use advanced policy options, including policy conditions and privilege limits, to control precisely the policies you want in very fine-grained ways. After completing this course, you will have a basic understanding of the policies and permissions to be granted permission to perform tasks on AWS that will help you secure your AWS infrastructure.

GO TO TRAINING

Course name: Penetration tests of identity, authentication and authorization mechanisms

Our opinion: Instructor Prasad Salvi, an application security consultant and part-time bug bounty hunter, teaches students about penetration testing through the lens of an identity management, authentication and authorization mechanism.

“Hackers gain access to your sensitive data by exploiting vulnerabilities in web applications. In this course, Penetration Testing of Identity, Authentication and Authorization Mechanisms, you will acquire the ability to perform web application pentesting. First, you will learn about identity management. Next, learn how to crack a website’s authentication. Finally, you will learn how to bypass the authorization mechanism. After completing this course, you will have the skills and knowledge of web application penetration testing required to conduct various attack scenarios.

GO TO TRAINING

Course name: Configure Microsoft Azure Active Directory Privileged Identity Management

Our opinion: In this course, you will learn all about configuring Microsoft Azure Active Directory for privileged access management and special permissions. The instructor, Tim Warner, is a Microsoft Most Valuable Professional (MVP) in Cloud and Datacenter Management.

“In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you will learn how to use this tool to quickly identify high-privilege holders and assign time-limited on-demand administrative access. First, you’ll learn how to use Azure AD PIM to manage and report on both Azure AD and Azure resource roles. Next, you’ll discover the “how and why” of access reviews. Finally, you will learn how to review the entire process to ensure security compliance. After completing this course, you will have the skills and knowledge to enforce least privilege access in your Azure environment, which will greatly improve your corporate security status in Azure.

GO TO TRAINING

Course name: Microsoft DevOps Solutions: Designing an Authentication and Authorization Strategy

Our opinion: Identity and access management is an important tool for DevOps practitioners. This course from Microsoft MVP John Savill explains how you can use Microsoft’s DevOps solutions to set up an authentication and authorization strategy.

“In this course, Microsoft DevOps Solutions: Designing an Authentication and Authorization Strategy, you will learn to take full advantage of the identity capabilities available in Azure. First, you’ll learn how to control access to resources using RBAC and Conditional Access. Next, we’ll see how to enable just-in-time role augmentation. Finally, you will learn how to provide identities for application processes and pipelines. By completing this course, you will have the skills and knowledge of cloud authentication and authorization necessary to enable full identity-based controls and application access securely.

GO TO TRAINING

Solutions Review participates in partner programs. We can receive a small commission from products purchased through this resource.

Download link to purchase manual for Privileged Access Management

Daniel Hein

Dan is a technical writer who writes on cybersecurity for Solutions Review. He graduated from Fitchburg State University with a bachelor’s degree in professional writing. You can reach him at [email protected]

Daniel HeinLatest posts by Daniel Hein (See everything)