Macquarie University

Cyber Security: Identity Access Management and Authentication

Macquarie University

Cyber Security: Identity Access Management and Authentication

Matt Bushby

Instructor: Matt Bushby

Access provided by Emirates NBD

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Design secure authentication system architecture.

  • Implement SSO, MFA, and passwordless authentication.

  • Manage digital user access with modern IAM frameworks.

  • Identify and mitigate cyber risks from identity threats.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Cyber Security: Data & Identity Security Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Managing who has access to what, and when is critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for the course. You will explore the core components of the IAM ecosystem, learn to discuss IAM in business and technical contexts, and become familiar with common authentication methods. We will also break down effective IAM architecture elements, providing tools to start designing access management systems based on organizational requirements. By the end of this topic, you will understand how IAM supports security and operations and be able to design a simple, effective IAM architecture tailored to real-world needs.

What's included

1 assignment16 plugins

Effective identity and access management involves managing the entire user lifecycle, not just authentication. In this topic, you will explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation. We will examine how these processes differ across cloud and on-premises environments, and discuss the limitations, compromises, and security trade-offs that come with each. You will also learn to configure selected IAM processes and adapt them to meet your organization's needs. By the end of this topic, you will have a clear understanding of how IAM processes support secure access at every stage of the user journey and how to implement them effectively in real-world environments.

What's included

1 assignment5 plugins

With cloud services, multiple platforms, and growing user demands, seamless and secure access is essential. This topic explores identity federation, which links a user’s digital identity across systems and organizations for smoother, more secure authentication. You will learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We will also look at the growing use of social login and how federated identities simplify user access while maintaining security. By the end of this topic, you will understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach for your organizational needs.

What's included

1 assignment11 plugins

With advancing cyber threats, relying on a single password is no longer enough. This topic introduces two-factor (2FA) and multi-factor authentication (MFA), key strategies for strengthening identity verification and reducing unauthorized access. You will explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods like memorized secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We will also critically evaluate the strengths and limitations of each approach. By the end of this topic, you will be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.

What's included

1 assignment10 plugins

Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You’ll explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We’ll also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations.By the end of this topic, you’ll not only understand the risks, you’ll gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.

What's included

1 assignment6 plugins

With evolving cyber threats, our approach to authentication must adapt. Traditional passwords are increasingly vulnerable and difficult to manage for users and IT teams. In this topic, we explore passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You will learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider if these approaches can truly replace passwords. We will also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you will understand how to design and implement passwordless solutions that enhance security and user experience.

What's included

1 reading1 assignment6 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses 17,354 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Explore more from Computer Science