Online or onsite, instructor-led live Identity and Access Management (IAM) training courses demonstrate through interactive hands-on practice how to use IAM tools and techniques to manage user identities, enforce access policies, and secure digital resources.
Identity and Access Management (IAM) training is available as "online live training" or "onsite live training." Online live training (also known as "remote live training") is conducted via an interactive remote desktop. Onsite live training can be arranged at customer premises in Indiana or in Govtra corporate training centers in Indiana.
Identity and Access Management (IAM) is also referred to as Identity Management or Access Control.
Govtra -- Your Local Training Provider for government
Indianapolis, IN - Lockerbie Marketplace
333 N. Alabama Street Suite 350, Indianapolis, United States, 46204
Regus at Lockerbie Marketplace is centrally located in downtown Indianapolis and easily accessible by car, with public parking available along North Alabama Street and in nearby garages. Visitors flying into Indianapolis International Airport (IND) can reach the venue in approximately 20 to 25 minutes via taxi or rideshare, following I‑70 E and exiting onto New York Street toward downtown. For public transit users, IndyGo routes serving the Massachusetts Avenue and Chatham Arch districts stop within a few blocks, making the location convenient for those traveling from other parts of the city.
Fort Wayne, IN - Regus – Power Center
110 E Wayne St floor 12, Fort Wayne, United States, 46802
The venue is conveniently located in downtown Fort Wayne, easily accessible by car via Interstate 69 through either the South Clinton Street or Apple Street exits, which lead directly into the Wayne Street corridor. Visitors will find nearby parking garages as well as metered street parking options. For those arriving by air, the venue is approximately 13 miles northeast of Fort Wayne International Airport (FWA), with a taxi or rideshare ride taking about 20 minutes via I‑69 and Jefferson Boulevard. Public transit is also available: Citilink buses serve downtown with stops just a few blocks away from the venue, near the intersection of Wayne and Clinton Streets.
Indianapolis, IN - Regus – Parkwood Crossing Center
450 E 96th St #500, Indianapolis, United States, 46240
This venue is conveniently accessed by car via the I‑465 beltway, exiting north onto Keystone Avenue before turning onto E 96th Street; ample parking is available in the adjacent surface and garage lots. For those arriving by air, the Indianapolis International Airport (IND) is approximately 17 miles away, with taxis or rideshares taking roughly 25–30 minutes via I‑465 and Keystone Avenue. Public transit is available via IndyGo routes 19 and 120, which serve the 96th Street corridor; the bus stop at Parkwood Crossing is only a short walk from the building.
Honeywell ProWatch is an enterprise-grade security management platform designed to integrate access control, video surveillance, and intrusion detection into a single, cohesive solution.
This instructor-led, live training (available online or on-site) is tailored for beginner to intermediate-level security professionals who aim to configure, manage, and optimize ProWatch systems for secure operations in various settings, including those specific to government facilities.
By the end of this training, participants will be able to:
- Install and configure Honeywell ProWatch software and hardware.
- Manage user access and permissions across multiple facilities.
- Integrate ProWatch with video and intrusion detection systems.
- Utilize advanced monitoring, reporting, and audit features.
**Format of the Course**
- Interactive lecture and discussion sessions.
- Hands-on configuration and laboratory exercises.
- Practical integration scenarios using ProWatch features.
**Course Customization Options**
To request a customized training for government or other specific needs, please contact us to arrange.
Keyscan Aurora is a robust access control software designed to manage and monitor secure entry systems in commercial, institutional, and government facilities.
This instructor-led, live training (available online or on-site) is tailored for beginner-level to intermediate-level security professionals who wish to effectively install, configure, and manage Keyscan Aurora access control systems.
By the end of this training, participants will be able to:
- Install and configure Keyscan Aurora software.
- Set up and manage user credentials and access levels.
- Integrate Keyscan with other security systems.
- Monitor, troubleshoot, and maintain access control operations.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on exercises and practice using Keyscan Aurora software.
- Practical lab work with simulated or live hardware.
**Course Customization Options for Government Entities**
- To request a customized training for government agencies, please contact us to arrange.
The WSO2 Identity Server is an open-source Identity and Access Management (IAM) solution designed to secure APIs, microservices, and web applications. This instructor-led, live training (available online or onsite) is tailored for intermediate-level IT professionals who aim to implement identity federation, single sign-on (SSO), and access control using WSO2 Identity Server.
By the end of this training, participants will be able to:
- Install, configure, and manage WSO2 Identity Server.
- Enable SSO, identity federation, and multi-factor authentication.
- Integrate with LDAP, Active Directory, and third-party Identity Providers (IdPs).
- Design and enforce robust authentication and authorization workflows.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on use of WSO2 Identity Server in sample identity management scenarios.
- Guided exercises focused on integration, authentication, and access control.
**Course Customization Options for Government**
To request a customized training for this course based on your organization’s environment or IAM architecture, please contact us to arrange. This option ensures that the training aligns with specific public sector workflows, governance, and accountability requirements.
This instructor-led, live training in Indiana (online or onsite) is aimed at system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization for government systems. By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using both the web console and command-line interface (CLI).
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD to enhance performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory for managing and securing data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Establish a domain and define user and device access rights.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication for government operations.
In this instructor-led, live training Indiana (online or onsite), we discuss CAS’s architecture and features and practice installing and configuring a CAS server for government use.
By the end of this training, participants will be able to:
Understand CAS’s implementation of SSO (Single-Sign-On Authentication) in the context of public sector workflows.
Acquire the necessary skills to deploy and manage their own authentication server for government applications.
This instructor-led, live training in Indiana (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Utilize FreeIPA’s command-line interface (CLI), web user interface (Web UI), and remote procedure call (RPC) interface to set up and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications for government use.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
This instructor-led, live training in Indiana (online or onsite) is designed for beginner-level to intermediate-level IT professionals and security analysts who are interested in using Identity and Access Management (IAM) to secure and manage digital identities and resources for government.
By the end of this training, participants will be able to:
Utilize IAM concepts and terminology to effectively describe and analyze various identity and access scenarios and challenges.
Implement and manage identity and access solutions for different platforms and environments using IAM tools and technologies.
Integrate and ensure interoperability between different identity and access systems and services using IAM standards and protocols.
Design and evaluate identity and access policies and processes in alignment with IAM best practices and frameworks.
In this instructor-led, live training in Indiana (online or onsite), participants will learn how to create an Indy-based decentralized identity system for government use.
By the end of this training, participants will be able to:
Create and manage decentralized, self-sovereign identities using distributed ledgers for government applications.
Enable interoperability of digital identities across domains, applications, and silos within public sector workflows.
Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc., in the context of government operations.
Use Indy to enable identity owners to independently control their personal data and relationships for government services.
This instructor-led, live training, offered both online and on-site, is designed for government personnel and software professionals at the beginner, intermediate, and advanced levels. The course aims to equip participants with the skills necessary to utilize Permguard effectively to enhance enterprise security for government operations.
This instructor-led, live training (online or onsite) is designed for government system administrators who wish to utilize Okta for identity and access management. By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta for government.
- Integrate Okta into an existing application within a government environment.
- Implement security measures with multi-factor authentication to enhance cybersecurity for government systems.
This instructor-led, live training in Indiana (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP for government.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP in various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Integrate OpenLDAP with third-party services and applications.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Utilize federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs, ensuring compliance with security standards for government use.
This instructor-led, live training in [location] (online or onsite) is designed for system administrators who wish to utilize OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing performance for government operations.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.
This instructor-led, live training in Indiana (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently for government, including digital certificates, encryption, and CSCA standards.
By the end of this training, participants will be able to:
Design, deploy, and manage a secure PKI system for government.
Evaluate cryptographic techniques and algorithms used in PKI for government.
Understand and implement CSCA standards for national and international document security for government.
Secure digital communications and storage using PKI-enabled technologies for government.
Read more...
Last Updated:
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it.
He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.
Online IAM (Identity and Access Management) training in Indiana, Identity and Access Management training courses in Indiana, Weekend Identity and Access Management courses in Indiana, Evening Identity and Access Management (IAM) training in Indiana, Identity Management instructor-led in Indiana, Identity and Access Management (IAM) private courses in Indiana, IAM (Identity and Access Management) on-site in Indiana, IAM instructor in Indiana, Online Identity and Access Management (IAM) training in Indiana, Identity Management trainer in Indiana, Evening Identity and Access Management (IAM) courses in Indiana, Identity and Access Management boot camp in Indiana, Identity Management coaching in Indiana, Identity Management instructor-led in Indiana, IAM (Identity and Access Management) classes in Indiana, Weekend IAM (Identity and Access Management) training in Indiana, Identity and Access Management (IAM) one on one training in Indiana