Template id = 976
Document id = 23589
Parent id = 23150

Identity Management & Access Control

4-day training about increasing security and productivity while decreasing cost, downtime and repetitive tasks with Identity Management & Access Control (IAM)

Identity Management & Access Control – mode of study

Option 1: Public 4-day Identity Management & Access Control training
Option 2: In-company Identity Management & Access Control training

Identity Management & Access Control (IAM) – why?

Identity Management and Access ControlEnterprises need to manage access to information and applications scattered across internal and external application systems. Moreover, they must provide this access for a growing number of identities, both inside and outside the organisation, without compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. IMF Academy advocates an approach to govern Identity Management & Access Control initiatives so as to manage the full spectrum of risks and achieve desirable business outcomes.

Make Identity Management & Access Control (IAM) work for you!

Business demands on Identity Management & Access Control (IAM) are changing rapidly, resulting in the requirement to adopt emerging technologies (e.g. mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Specifically cloud computing creates new Identity Management & Access Control risks that must be managed. Typical pitfalls include the difficulty of managing access consistently across the enterprise and the increased complexity (which also drives up the cost) of incorporating new technologies into the existing Identity Management & Access Control processes.

Effective Identity Management processes are integral to driving business value, reducing risk, sustaining compliance, improving the end user experience and responding to the changing IT landscape. Identity Management & Access Control is a critical step in the process of securing company resources, while allowing users enough access to get the job done.

Enterprises that develop mature Identity Management & Access Control capabilities can reduce their Identity Management costs significantly. Poorly controlled Identity Management & Access Control processes may lead to regulatory non-compliance, because your company will not be able to prove that company data is not at risk for being misused. To help reach the goal of an enabler that reduces risks, this 4-day Identity Management & Access Control focused training explains life cycle phases, relevant IT trends, a capability maturity model, key considerations for transformation, tools and how to get started.

Identity Management & Access Control – for what professionals is this training a must?

Are you responsible for the successful implementation of Identity Management and Access Control in your organization? Don't hesitate, this is the training you have been waiting for. This 4-day Identity Management & Access Control training is a must for identity managers, process managers, IT managers, (IT) information managers, (information) security managers, IT auditors, network managers, security architects, risk managers, compliance managers, and Human Resources managers.

Identity Management & Access Control – what is it?

Identity Management & Access Control is the discipline for managing access to enterprise resources. It is a foundational element of any information security program. Identity Management describes the management of individual principals, their authentication, authorisation, and privileges within or across system and enterprise boundaries for the purpose of increasing security and productivity while decreasing cost, downtime, and repetitive tasks. The terms Identity Management (IdM) and Identity & Access Management (IAM) are used interchangeably.

Identity Management covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection (e.g. network protocols, digital certificates, passwords, etc.). Identity Management and Access Control comprises of people, processes and products to manage identities and access to resources of your enterprise. The ultimate goal of the Identity Management & Access Control framework is to provide the right people with the right access at the right time.

Identity Management & Access Control – prerequisites

The trainer expects you to have some years of working experience in the IT area or having experience with Process Management.

Identity Management & Access Control – level of the training

The training will be held on a post-bachelor level.

Identity Management & Access Control – limited number of participants

The number of training participants is limited so they may benefit from the exercises.

Identity Management & Access Control – feedback from participants

The Identity Management & Access Control training is assessed by participants with an 8 (on a scale from 1 to 10).

"Great training. Gave a good insight of what IAM is about. I could relate it to our current status quo and identity course of action for further analysis."

"The training was perfect, complete and custumised."
Thierry De Brabandere, IT Security Associate Director, Coca Cola European Partners

"A good trainer, very patient, explains a lot and very good." 

"The trainer is very knowledgeable & professional."

"Good overview of the IAM domain." 
IAM Manager

"Good source of knowledge and exchange of experience platform."

"High quality, great interaction."

"Good introduction to the IAM landscape, principles, best practices and technical overview."
IAM Manager






With at least 5 participants it is possible to conduct this Identity Management & Access Control training in-company. Please contact us to discuss the possibilities.

The in-company Identity Management & Access Control training will be:

  • completely adapted to your organisation;
  • conducted in your own working environment;
  • will save you time and money; and
  • sensitive information can be openly discussed, as there are no outsiders involved.


Identity Management & Access Control

  • Problem statement
  • Drivers for Identity Management & Access Control
  • Business Case practice
  • Compliance
  • Identity philosophy

Authorisation Management

  • Authorisation
  • Authorisation Management
  • Role Based Access Control (RBAC)
  • RABC practice
  • Access Governance
  • Access practice

Identity Management

  • Identity
  • Identity Management practice
  • Identification and Authentication
  • Federated Identity Management
  • Single Sign-On (SSO)
  • Security Controls practice


  • Sources for Identities
  • Cloud-HR-CRM
  • Reference Model
  • SABSA practice


  • Public Key Infrastructure (PKI)
  • Federated Identity Management
  • Security Controls practice


  • The Cloud
  • Cloud developments
  • Cloud Architecture practice
  • Trust frameworks
  • Privacy
  • Cyberwar


  • Information Security Process Improvement (ISPI)
  • ISO2700X practice
  • Risk analysis by means of the quadrant method
  • Risk analysis - practice
  • Technical security


  • Do's and don'ts
  • Practice
  • Repeat
  • Questions and answers
Request brochure


Identity Management & Access Control trainer

André Koot (IMF Academy)André Koot is Security and IAM Lead Consultant at Sonic Bee. André is also a member of the BoK Committee of IDPro, the professional organization for IAM experts, as well as a member of the advisory board of Identity next and a board member of the Cloud Security Alliance (Netherlands Chapter).Diederik Hammer

Diederik Hammer, CISM CISSP
Diederik Hammer trainer IMF AcademyDiederik Hammer is an information security & IAM consultant at SonicBee. Diederik has multiple years of experience on the various aspects that are related to IAM, like IGA, CIAM & PAM. In the last few years, he specialised himself in other areas of information security leading to the roles of information security officer and consultant. To achieve this, he certified himself with certifications like CISSP & CISM but also focussed on other areas than information security such as IT-architecture and program management.

Start date(s)

The Identity Management & Access Control training consists of 4 training days from 09.00 hrs in the morning until 17.00 hrs in the afternoon. The training will be held close to Amsterdam (The Netherlands).

  • 2 + 3 + 9 + 10 October 2024

Fee / Registration

The fee for the Identity Management & Access Control training is EUR 4,380 (VAT excl.). The fee includes all lunches, coffee, tea and course materials.

Step 1/4: Your selection *

Terms & Conditions
Delegates may transfer to a later training (if possible), but must notify us 4 weeks prior to the start of the booked training. In case you are not able to attend, an alternate participant for the training can be substituted within 7 days of the training commencement for no additional charge.
Written cancellations will be accepted up to 4 weeks prior to the commencement of the Identity Management & Access Control training. We will incur 10% of the charge administration costs. If you cancel within 4 weeks before the start of the training, you have to pay 100% of the charge.
Payment of course fees must be received within 30 days of the invoice date, though always before the start of the course.

Identity Management & Access Control

Register! Brochure IN-COMPANY
powered by webEdition CMS