Macquarie University
Identity Access Management (IAM) and Secure Authentication
Macquarie University

Identity Access Management (IAM) and Secure Authentication

Matt Bushby

Instructor: Matt Bushby

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

9 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

9 hours to complete
Flexible schedule
Learn at your own pace

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

In today’s digital world, managing who has access to what—and when—is critical to securing systems and data. This topic introduces the fundamentals of Identity and Access Management (IAM) and lays the groundwork for everything to come in the course. You’ll explore the core components of the IAM ecosystem, learn how to talk about IAM in a business and technical context, and become familiar with the authentication methods commonly used across industries. We’ll also break down the elements of effective IAM architecture, giving you the tools to start designing access management systems based on specific organisational requirements. By the end of this topic, you’ll understand how IAM supports security and operations—and be able to design a simple but effective IAM architecture tailored to real-world needs.

What's included

1 assignment16 plugins

Effective identity and access management isn’t just about authentication—it’s about managing the entire user lifecycle. In this topic, you'll explore the key processes that underpin IAM, from onboarding and provisioning to password recovery and deactivation. We’ll examine how these processes differ across cloud and on-premises environments, and dive into the limitations, compromises, and security trade-offs that come with each. You'll also learn how to configure selected IAM processes and adapt them to meet the needs of your organisation. By the end of this topic, you’ll have a clear understanding of how IAM processes support secure access at every stage of the user journey—and how to implement them effectively in real-world environments.

What's included

1 assignment5 plugins

In a world of cloud services, multiple platforms, and growing user demands, seamless and secure access is more important than ever. This topic explores identity federation—the practice of linking a user’s digital identity across systems and organisations to enable smoother and more secure authentication. You’ll learn how identity federation is implemented in both cloud and on-prem environments, and how it enables features like Single Sign-On (SSO) and Single Logout (SLO). We'll also look at the growing use of social login and how federated identities can be leveraged to simplify user access while maintaining security. By the end of this topic, you’ll understand how to evaluate and implement identity federation in real-world IAM systems, and how to choose the right approach depending on your organisational needs.

What's included

1 assignment11 plugins

As cyber threats grow more sophisticated, relying on a single password is no longer enough. This topic introduces you to the world of two-factor (2FA) and multi-factor authentication (MFA)—key strategies in strengthening identity verification and reducing unauthorised access. You’ll explore the differences between 2FA, MFA, and multilayered authentication, and understand how methods such as memorised secrets, generated codes, out-of-band verification, and biometric authentication contribute to secure access. We’ll also critically evaluate the strengths and limitations of each approach—including whether biometrics truly offer a foolproof solution. By the end of this topic, you’ll be equipped to implement second factor authentication into an IAM flow and make informed decisions about which factors to apply in different security contexts.

What's included

1 assignment10 plugins

Even the most advanced authentication systems are not immune to risk. In this topic, we examine the threat landscape surrounding identity and access management, diving into the vulnerabilities and attack vectors that continue to challenge even well-designed security frameworks. You’ll explore real-world examples of compromised authentication systems, learn how attackers exploit weak points, and uncover lessons from past failures. We’ll also assess the risks and threats specific to various authentication methods, giving you the insight needed to critically evaluate and strengthen IAM implementations. By the end of this topic, you’ll not only understand the risks—you’ll gain practical experience in defending against a selected attack vector, equipping you with the knowledge to build more secure authentication environments.

What's included

1 assignment6 plugins

As cyber threats evolve, so must our approach to authentication. Traditional passwords are increasingly vulnerable and difficult to manage—both for users and IT teams. In this topic, we explore the emerging world of passwordless authentication, a security model that replaces static passwords with cryptographic methods and modern protocols. You’ll learn how passwordless authentication fits into IAM flows, examine technologies like FIDO2 and WebAuthn, and consider whether these approaches can truly replace passwords. We’ll also look back at earlier methods such as smartcards and PIV to understand how the concept has evolved. By the end of this module, you’ll understand how to design and implement passwordless solutions that enhance security and user experience.

What's included

1 assignment6 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
0 Courses0 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Computer Security and Networks? Start here.

Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions