Imate žicu za učenje?

Identity, Presence, and Privacy

As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.

Target Audience
This course is intended for IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services. The course outlines the benefits and downfalls of implementing or using services in a cloud and helps IT professionals determine what types of technology or services are suitable for cloud networks and how those services are hosted in a cloud computing environment.

Expected Duration (hours)

Lesson Objectives

Identity, Presence, and Privacy

  • recognize the need for identity and access management
  • match the key operational areas involved in identity and access management to their descriptions
  • recognize examples of cloud use cases that require IAM support from cloud service providers
  • identify some key cloud federation considerations
  • describe the characteristics of Single Sign-On
  • match the challenges associated with the use Identity as a Service to the user group to which they apply
  • classify the pros and cons of using IDaaS as an identity management solution
  • specify the need for identity and access management in a given scenario
  • propose an access solution for a given scenario
  • describe the considerations involved in using IDaaS
  • describe the technical requirements a business must meet to take advantage of presence information
  • match the main components of a presence service to its description
  • identify the security requirements for presence
  • describe the key privacy concerns in a cloud computing environment
  • match the security measures to the phases of the data life cycle
  • describe the technical and security factors involved in leveraging presence in the cloud
  • specify the key security and privacy considerations involved in operation in the cloud
  • Trajanje: 
    1,5 h

    Koraci do učenja

    1Prijavi se

    Prijavite se, a ako nemate korisničko ime, registrirajte se.

    2Pronađi i upiši program

    Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.


    Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

    »Detaljne upute

    Trenutno nema programa koji imaju objavljene termine.