Online or onsite, instructor-led live Identity and Access Management (IAM) training courses demonstrate through interactive hands-on practice how to use IAM tools and techniques to manage user identities, enforce access policies, and secure digital resources.
Identity and Access Management (IAM) training is available as "online live training" or "onsite live training." Online live training (also known as "remote live training") is conducted via an interactive remote desktop. Onsite live training can be arranged at customer premises in Michigan or in Govtra corporate training centers in Michigan.
Identity and Access Management (IAM) is also referred to as Identity Management or Access Control.
Govtra -- Your Local Training Provider for government
Detroit, MI - Renaissance Center
400 Renaissance Center, Detroit, United States, 48243
The GM Renaissance Center is conveniently located in downtown Detroit and easily accessed by car via Interstates 75 or 94, with secure underground parking available on site. Travelers flying into Detroit Metropolitan Airport (DTW) can expect a 25–30 minute trip by taxi or rideshare via I‑94. Public transit is efficient: the Detroit People Mover stops directly at the Renaissance Center station, and DDOT routes 3 and 9 serve nearby Jefferson Avenue. Pedestrian skywalks provide safe indoor access from downtown hotels, parking garages, and the riverwalk.
Ann Arbor, MI – Regus - South State Commons I
2723 S State St, Ann Arbor, United States, 48104
Regus South State Commons I is conveniently located off I‑94 via Exit 177 (State Street), with easy access to downtown Ann Arbor and surrounding suburbs. The building offers free on-site surface parking for guests. From Detroit Metropolitan Airport (DTW), the venue can be reached in approximately 20–25 minutes by taxi or rideshare via I‑94 West. Local public transit service (TheRide) operates Route 24 along South State Street, with a stop within a short 2-minute walk of the building.
Grand Rapids, MI - Regus – Calder Plaza
250 Monroe Ave NW, Grand Rapids, United States, 49503
The venue sits centrally at 250 Monroe Avenue NW in downtown Grand Rapids, easily accessed by car via US‑131 or I‑196—with connections via Monroe or Ottawa exits—and offers shared underground and surface parking. From Gerald R. Ford International Airport, take I‑96 East then I‑196 West into the city; the drive is about 20 minutes. Public transit through Rapid bus routes stops near Monroe or Ottawa Avenue, just a short walk from the Regus entrance; the downtown area is pedestrian-friendly.
Lansing, MI - Regus - One Michigan Avenue
120 North Washington Square, Lansing, United States, 48933
The venue is located in the heart of Lansing’s central business district at 120 North Washington Square, easily accessible by car via I‑496 or US‑127 with convenient street parking and a nearby parking ramp. From Capital Region International Airport (LAN), the location is approximately a 12‑minute drive west via I‑96 and US‑127, with taxis and rideshares readily available. Public transit users can take CATA bus routes that stop just a block away on Washington or Grand Avenue, offering seamless access to the venue.
Honeywell ProWatch is an enterprise-grade security management platform designed to integrate access control, video surveillance, and intrusion detection into a single, cohesive solution.
This instructor-led, live training (available online or on-site) is tailored for beginner to intermediate-level security professionals who aim to configure, manage, and optimize ProWatch systems for secure operations in various settings, including those specific to government facilities.
By the end of this training, participants will be able to:
- Install and configure Honeywell ProWatch software and hardware.
- Manage user access and permissions across multiple facilities.
- Integrate ProWatch with video and intrusion detection systems.
- Utilize advanced monitoring, reporting, and audit features.
**Format of the Course**
- Interactive lecture and discussion sessions.
- Hands-on configuration and laboratory exercises.
- Practical integration scenarios using ProWatch features.
**Course Customization Options**
To request a customized training for government or other specific needs, please contact us to arrange.
Keyscan Aurora is a robust access control software designed to manage and monitor secure entry systems in commercial, institutional, and government facilities.
This instructor-led, live training (available online or on-site) is tailored for beginner-level to intermediate-level security professionals who wish to effectively install, configure, and manage Keyscan Aurora access control systems.
By the end of this training, participants will be able to:
- Install and configure Keyscan Aurora software.
- Set up and manage user credentials and access levels.
- Integrate Keyscan with other security systems.
- Monitor, troubleshoot, and maintain access control operations.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on exercises and practice using Keyscan Aurora software.
- Practical lab work with simulated or live hardware.
**Course Customization Options for Government Entities**
- To request a customized training for government agencies, please contact us to arrange.
The WSO2 Identity Server is an open-source Identity and Access Management (IAM) solution designed to secure APIs, microservices, and web applications. This instructor-led, live training (available online or onsite) is tailored for intermediate-level IT professionals who aim to implement identity federation, single sign-on (SSO), and access control using WSO2 Identity Server.
By the end of this training, participants will be able to:
- Install, configure, and manage WSO2 Identity Server.
- Enable SSO, identity federation, and multi-factor authentication.
- Integrate with LDAP, Active Directory, and third-party Identity Providers (IdPs).
- Design and enforce robust authentication and authorization workflows.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on use of WSO2 Identity Server in sample identity management scenarios.
- Guided exercises focused on integration, authentication, and access control.
**Course Customization Options for Government**
To request a customized training for this course based on your organization’s environment or IAM architecture, please contact us to arrange. This option ensures that the training aligns with specific public sector workflows, governance, and accountability requirements.
This instructor-led, live training in Michigan (online or onsite) is aimed at system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization for government systems. By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using both the web console and command-line interface (CLI).
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD to enhance performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory for managing and securing data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Establish a domain and define user and device access rights.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication for government operations.
In this instructor-led, live training Michigan (online or onsite), we discuss CAS’s architecture and features and practice installing and configuring a CAS server for government use.
By the end of this training, participants will be able to:
Understand CAS’s implementation of SSO (Single-Sign-On Authentication) in the context of public sector workflows.
Acquire the necessary skills to deploy and manage their own authentication server for government applications.
This instructor-led, live training in Michigan (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Utilize FreeIPA’s command-line interface (CLI), web user interface (Web UI), and remote procedure call (RPC) interface to set up and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications for government use.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
This instructor-led, live training in Michigan (online or onsite) is designed for beginner-level to intermediate-level IT professionals and security analysts who are interested in using Identity and Access Management (IAM) to secure and manage digital identities and resources for government.
By the end of this training, participants will be able to:
Utilize IAM concepts and terminology to effectively describe and analyze various identity and access scenarios and challenges.
Implement and manage identity and access solutions for different platforms and environments using IAM tools and technologies.
Integrate and ensure interoperability between different identity and access systems and services using IAM standards and protocols.
Design and evaluate identity and access policies and processes in alignment with IAM best practices and frameworks.
In this instructor-led, live training in Michigan (online or onsite), participants will learn how to create an Indy-based decentralized identity system for government use.
By the end of this training, participants will be able to:
Create and manage decentralized, self-sovereign identities using distributed ledgers for government applications.
Enable interoperability of digital identities across domains, applications, and silos within public sector workflows.
Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc., in the context of government operations.
Use Indy to enable identity owners to independently control their personal data and relationships for government services.
This instructor-led, live training, offered both online and on-site, is designed for government personnel and software professionals at the beginner, intermediate, and advanced levels. The course aims to equip participants with the skills necessary to utilize Permguard effectively to enhance enterprise security for government operations.
This instructor-led, live training (online or onsite) is designed for government system administrators who wish to utilize Okta for identity and access management. By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta for government.
- Integrate Okta into an existing application within a government environment.
- Implement security measures with multi-factor authentication to enhance cybersecurity for government systems.
This instructor-led, live training in Michigan (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP for government.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP in various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Integrate OpenLDAP with third-party services and applications.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Utilize federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs, ensuring compliance with security standards for government use.
This instructor-led, live training in [location] (online or onsite) is designed for system administrators who wish to utilize OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing performance for government operations.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.
This instructor-led, live training in Michigan (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently for government, including digital certificates, encryption, and CSCA standards.
By the end of this training, participants will be able to:
Design, deploy, and manage a secure PKI system for government.
Evaluate cryptographic techniques and algorithms used in PKI for government.
Understand and implement CSCA standards for national and international document security for government.
Secure digital communications and storage using PKI-enabled technologies for government.
Read more...
Last Updated:
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it.
He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.
Online Identity Management training in Michigan, Identity and Access Management training courses in Michigan, Weekend IAM (Identity and Access Management) courses in Michigan, Evening IAM training in Michigan, IAM instructor-led in Michigan, IAM (Identity and Access Management) classes in Michigan, Identity and Access Management (IAM) boot camp in Michigan, Identity and Access Management (IAM) on-site in Michigan, Identity and Access Management (IAM) instructor-led in Michigan, Identity and Access Management instructor in Michigan, IAM trainer in Michigan, Evening IAM courses in Michigan, Online IAM (Identity and Access Management) training in Michigan, Identity and Access Management coaching in Michigan, Identity and Access Management (IAM) private courses in Michigan, Identity Management one on one training in Michigan, Weekend Identity and Access Management training in Michigan