Online or onsite, instructor-led live Identity and Access Management (IAM) training courses demonstrate through interactive hands-on practice how to use IAM tools and techniques to manage user identities, enforce access policies, and secure digital resources.
Identity and Access Management (IAM) training is available as "online live training" or "onsite live training." Online live training (also known as "remote live training") is conducted via an interactive remote desktop. Onsite live training can be arranged at customer premises in Wisconsin or in Govtra corporate training centers in Wisconsin.
Identity and Access Management (IAM) is also referred to as Identity Management or Access Control.
Govtra -- Your Local Training Provider for government
Milwaukee, WI - Downtown Milwaukee
250 E Wisconsin Ave 18th floor, Milwaukee, United States, 53202
This Regus centre is located on the 18th floor of Two‑Fifty in downtown Milwaukee, with excellent car access via I‑43 or I‑794 and secure paid underground parking within the building. From General Mitchell International Airport (MKE), take I‑94 West to I‑794, then exit onto East Wisconsin Avenue; the taxi or rideshare ride typically takes 15–20 minutes. Public transit users can use MCTS bus routes along Wisconsin Avenue or nearby stops such as Cathedral Square—followed by a short walk into the building’s lobby.
Madison, WI - Regus - Madison East - Park Bank Plaza
2810 Crossroads Dr #4000, Madison, United States, 53718
The venue occupies the 4th floor of Park Bank Plaza, a modern office tower in East Madison’s High Crossing district at 2810 Crossroads Drive. It is convenient by car via I‑90/94 and Highway 51, with secure covered parking on-site. From Dane County Regional Airport (MSN), head west on US 12/18, merge onto I‑90/94, exit at Crossroads Drive for a 15-minute taxi or rideshare ride. Metro Transit buses stop directly at Crossroads Drive; it’s just a short walk from the bus stop to the Regus entrance.
Middleton, WI - Regus - Middleton Greenway
8383 Greenway Blvd #600, Middleton, United States, 53562
The Regus centre at Middleton Greenway is situated in the award-winning Smith & Gesteland Building at 8383 Greenway Boulevard. It’s easily accessible by car via I‑90/I‑94 and Highway 51, with secure covered parking on-site and ample surface spaces. From Dane County Regional Airport (MSN), travel south on Highway 51 and merge onto I‑90/I‑94, exiting at Greenway Boulevard—taxi or rideshare typically takes about 20 minutes. Public transit users can take Metro Transit routes to the Greenway Boulevard stop just outside the building; the entrance is a short walk from the bus stop.
Honeywell ProWatch is an enterprise-grade security management platform designed to integrate access control, video surveillance, and intrusion detection into a single, cohesive solution.
This instructor-led, live training (available online or on-site) is tailored for beginner to intermediate-level security professionals who aim to configure, manage, and optimize ProWatch systems for secure operations in various settings, including those specific to government facilities.
By the end of this training, participants will be able to:
- Install and configure Honeywell ProWatch software and hardware.
- Manage user access and permissions across multiple facilities.
- Integrate ProWatch with video and intrusion detection systems.
- Utilize advanced monitoring, reporting, and audit features.
**Format of the Course**
- Interactive lecture and discussion sessions.
- Hands-on configuration and laboratory exercises.
- Practical integration scenarios using ProWatch features.
**Course Customization Options**
To request a customized training for government or other specific needs, please contact us to arrange.
Keyscan Aurora is a robust access control software designed to manage and monitor secure entry systems in commercial, institutional, and government facilities.
This instructor-led, live training (available online or on-site) is tailored for beginner-level to intermediate-level security professionals who wish to effectively install, configure, and manage Keyscan Aurora access control systems.
By the end of this training, participants will be able to:
- Install and configure Keyscan Aurora software.
- Set up and manage user credentials and access levels.
- Integrate Keyscan with other security systems.
- Monitor, troubleshoot, and maintain access control operations.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on exercises and practice using Keyscan Aurora software.
- Practical lab work with simulated or live hardware.
**Course Customization Options for Government Entities**
- To request a customized training for government agencies, please contact us to arrange.
The WSO2 Identity Server is an open-source Identity and Access Management (IAM) solution designed to secure APIs, microservices, and web applications. This instructor-led, live training (available online or onsite) is tailored for intermediate-level IT professionals who aim to implement identity federation, single sign-on (SSO), and access control using WSO2 Identity Server.
By the end of this training, participants will be able to:
- Install, configure, and manage WSO2 Identity Server.
- Enable SSO, identity federation, and multi-factor authentication.
- Integrate with LDAP, Active Directory, and third-party Identity Providers (IdPs).
- Design and enforce robust authentication and authorization workflows.
**Format of the Course**
- Interactive lecture and discussion.
- Hands-on use of WSO2 Identity Server in sample identity management scenarios.
- Guided exercises focused on integration, authentication, and access control.
**Course Customization Options for Government**
To request a customized training for this course based on your organization’s environment or IAM architecture, please contact us to arrange. This option ensures that the training aligns with specific public sector workflows, governance, and accountability requirements.
This instructor-led, live training in Wisconsin (online or onsite) is aimed at system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization for government systems. By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using both the web console and command-line interface (CLI).
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD to enhance performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory for managing and securing data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Establish a domain and define user and device access rights.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication for government operations.
In this instructor-led, live training Wisconsin (online or onsite), we discuss CAS’s architecture and features and practice installing and configuring a CAS server for government use.
By the end of this training, participants will be able to:
Understand CAS’s implementation of SSO (Single-Sign-On Authentication) in the context of public sector workflows.
Acquire the necessary skills to deploy and manage their own authentication server for government applications.
This instructor-led, live training in Wisconsin (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Utilize FreeIPA’s command-line interface (CLI), web user interface (Web UI), and remote procedure call (RPC) interface to set up and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications for government use.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
This instructor-led, live training in Wisconsin (online or onsite) is designed for beginner-level to intermediate-level IT professionals and security analysts who are interested in using Identity and Access Management (IAM) to secure and manage digital identities and resources for government.
By the end of this training, participants will be able to:
Utilize IAM concepts and terminology to effectively describe and analyze various identity and access scenarios and challenges.
Implement and manage identity and access solutions for different platforms and environments using IAM tools and technologies.
Integrate and ensure interoperability between different identity and access systems and services using IAM standards and protocols.
Design and evaluate identity and access policies and processes in alignment with IAM best practices and frameworks.
In this instructor-led, live training in Wisconsin (online or onsite), participants will learn how to create an Indy-based decentralized identity system for government use.
By the end of this training, participants will be able to:
Create and manage decentralized, self-sovereign identities using distributed ledgers for government applications.
Enable interoperability of digital identities across domains, applications, and silos within public sector workflows.
Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc., in the context of government operations.
Use Indy to enable identity owners to independently control their personal data and relationships for government services.
This instructor-led, live training, offered both online and on-site, is designed for government personnel and software professionals at the beginner, intermediate, and advanced levels. The course aims to equip participants with the skills necessary to utilize Permguard effectively to enhance enterprise security for government operations.
This instructor-led, live training (online or onsite) is designed for government system administrators who wish to utilize Okta for identity and access management. By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta for government.
- Integrate Okta into an existing application within a government environment.
- Implement security measures with multi-factor authentication to enhance cybersecurity for government systems.
This instructor-led, live training in Wisconsin (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP for government.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP in various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Integrate OpenLDAP with third-party services and applications.
This instructor-led, live training in [location] (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Utilize federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs, ensuring compliance with security standards for government use.
This instructor-led, live training in [location] (online or onsite) is designed for system administrators who wish to utilize OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing performance for government operations.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.
This instructor-led, live training in Wisconsin (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently for government, including digital certificates, encryption, and CSCA standards.
By the end of this training, participants will be able to:
Design, deploy, and manage a secure PKI system for government.
Evaluate cryptographic techniques and algorithms used in PKI for government.
Understand and implement CSCA standards for national and international document security for government.
Secure digital communications and storage using PKI-enabled technologies for government.
Read more...
Last Updated:
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it.
He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.
Online IAM training in Wisconsin, IAM training courses in Wisconsin, Weekend Identity and Access Management courses in Wisconsin, Evening Identity Management training in Wisconsin, Identity and Access Management (IAM) instructor-led in Wisconsin, Identity Management instructor in Wisconsin, Identity and Access Management coaching in Wisconsin, Evening Identity and Access Management courses in Wisconsin, IAM (Identity and Access Management) boot camp in Wisconsin, Identity Management private courses in Wisconsin, Identity and Access Management (IAM) on-site in Wisconsin, Identity and Access Management trainer in Wisconsin, Identity and Access Management (IAM) one on one training in Wisconsin, IAM (Identity and Access Management) instructor-led in Wisconsin, Online Identity and Access Management training in Wisconsin, Weekend IAM training in Wisconsin, Identity and Access Management classes in Wisconsin