Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Consumer Identity & Access Management Market & Technology Overview
Section 0: Course Introduction
0.1: Introduction (4:47)
0.1: Book Download
Section 1: What is Consumer Identity & Access Management?
1.1: What is CIAM? (16:29)
1.2: Employee IAM automation (17:53)
1.3: CIAM Drivers (14:00)
1.4: CIAM Benefits (13:33)
1.5: Real World Examples (22:43)
1.6: Section Summary (6:51)
Section 2: CIAM Market Overview
2.1: Homegrown Solutions (19:43)
2.2: CIAM Capabilities of Specialist Providers (18:25)
2.3: Vendor Review IAM Solutions (12:51)
2.4: Vendor Review Marketing Solutions (13:22)
2.5: Vendor Review Amazon/Google/Microsoft (12:18)
2.6: Vendor Review Emerging Suppliers (15:42)
2.7: Future Trends (29:31)
2.8: Section Summary (5:46)
Section 3: CIAM Life Cycle
3.1: Onboarding (14:42)
3.2: Proofing (6:33)
3.3: Secure Login (10:05)
3.4: Device Binding (9:49)
3.5: Contextual & Adaptive Access (10:19)
3.6: Profile Management (11:02)
3.7: Consent Management (9:27)
3.8: Data Management (9:06)
3.9: Account Removal (9:53)
3.10: Section Summary (2:59)
Section 4: Requirements & Solution Design
4.1: Requirements (42:01)
4.2: Business Objectives Mapping (31:16)
4.3: Solution Design (28:01)
4.4: Section Summary (5:19)
Section 5: Implementation Standards Review
5.1: Cryptography Crash Course (22:38)
5.2: APIs, REST & JSON (7:53)
5.3: OAuth2 (14:00)
5.4: OpenID Connect (13:02)
5.5: User Managed Access (11:37)
5.6: FIDO/FIDO2/WebAuthn (18:51)
5.7: SCIM (9:57)
5.8: LDAP (13:03)
5.9: Section Summary (4:15)
Section 6: Vendor Selection Guidance
6.1: Vendor Selection Process (31:53)
6.2: Sample RFP (33:19)
6.3: PoC Design (20:56)
6.4: Section Summary (5:10)
Section 7: Measuring Success
7.1: Why Metrics Matter (13:18)
7.2: Sample Metric: User Acquisition (5:28)
7.3: Sample Metric: Shopping Cart Abandonment (5:56)
7.4: Sample Metric: Agent Assisted Support (7:04)
7.5: Sample Metric: Compliance Cost Reduction (6:53)
7.6: Sample Metric: Data Breach Reduction (6:55)
7.7: Section Summary (4:06)
Teach online with
5.1: Cryptography Crash Course
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock