Macquarie University
Cyber Security: Identity Access Management and Authentication
Macquarie University

Cyber Security: Identity Access Management and Authentication

Matt Bushby

位教师:Matt Bushby

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Design and manage secure authentication systems.

  • Implement SSO, MFA, and passwordless authentication.

  • Control user access with modern IAM frameworks.

  • Detect and respond to identity-based cyber threats.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

June 2025

作业

6 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Data & Identity Security 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

In today’s digital world, managing who has access to what, and when is critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for everything to come in the course. You’ll explore the core components of the IAM ecosystem, learn how to talk about IAM in a business and technical context, and become familiar with the authentication methods commonly used across industries. We’ll also break down the elements of effective IAM architecture, giving you the tools to start designing access management systems based on specific organisational requirements. By the end of this topic, you’ll understand how IAM supports security and operations and be able to design a simple but effective IAM architecture tailored to real-world needs.

涵盖的内容

1个作业17个插件

Effective identity and access management isn’t just about authentication, it’s about managing the entire user lifecycle. In this topic, you'll explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation.We’ll examine how these processes differ across cloud and on-premises environments, and dive into the limitations, compromises, and security trade-offs that come with each. You'll also learn how to configure selected IAM processes and adapt them to meet the needs of your organisation. By the end of this topic, you’ll have a clear understanding of how IAM processes support secure access at every stage of the user journey and how to implement them effectively in real-world environments.

涵盖的内容

1个作业5个插件

In a world of cloud services, multiple platforms, and growing user demands, seamless and secure access is more important than ever. This topic explores identity federation the practice of linking a user’s digital identity across systems and organisations to enable smoother and more secure authentication. You’ll learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We'll also look at the growing use of social login and how federated identities can be leveraged to simplify user access while maintaining security. By the end of this topic, you’ll understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach depending on your organisational needs.

涵盖的内容

1个作业12个插件

As cyber threats grow more sophisticated, relying on a single password is no longer enough. This topic introduces you to the world of two-factor (2FA) and multi-factor authentication (MFA), key strategies in strengthening identity verification and reducing unauthorised access.You’ll explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods such as memorised secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We’ll also critically evaluate the strengths and limitations of each approach, including whether biometrics truly offer a foolproof solution. By the end of this topic, you’ll be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.

涵盖的内容

1个作业10个插件

Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You’ll explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We’ll also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations.By the end of this topic, you’ll not only understand the risks, you’ll gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.

涵盖的内容

1个作业7个插件

As cyber threats evolve, so must our approach to authentication. Traditional passwords are increasingly vulnerable and difficult to manage, both for users and IT teams. In this topic, we explore the emerging world of passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You’ll learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider whether these approaches can truly replace passwords. We’ll also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you’ll understand how to design and implement passwordless solutions that enhance security and user experience.

涵盖的内容

1篇阅读材料1个作业6个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程7,136 名学生

提供方

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题