Course Outline
By the end of this training, participants will be able to:
Modern Authorization for Distributed Systems for government
Differentiate between Authorization (AuthZ) and Authentication (AuthN), including key differences and common pitfalls for government operations
Understand how the Identity & Access Management landscape has evolved for government
Identify today’s challenges in authentication (AuthN) for government systems
Explore AuthN in the context of distributed systems, such as cloud, microservices, and edge computing for government
Examine AuthZ and Policy-as-Code: the future of access control for government
Learn about PermGuard: an authorization server with workspaces and Git-like policy versioning for government
Troubleshooting common issues in authorization and authentication for government systems
Summary and Next Steps for government implementation
Requirements
- An understanding of fundamental security principles
- Basic programming experience
Audience for Government
- Developers
- Software Architects
- Business Managers
- Security Architects
- Software Analysts
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.