Course Details

Previous Page

Cloud Computing Fundamentals: Identity, Presence, and Privacy

Target Audience
Expected Duration
Lesson Objectives
Course Number

As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.

Target Audience
IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services


Expected Duration (hours)

Lesson Objectives

Cloud Computing Fundamentals: Identity, Presence, and Privacy

  • start the course
  • describe the basic concepts of identity and access management
  • list reasons for using identity federation
  • describe the operational areas of identity and access management
  • describe how cloud service providers can provide identity and access management
  • describe the concepts associated with identity federation
  • describe the considerations for implementing identity federation in cloud services
  • describe the standards for identity federation
  • describe access control systems with single sign-on
  • list the benefits and risks of single sign-on
  • describe the identity as a service authentication infrastructure
  • describe the challenges in implementing Identity as a Service
  • describe methods for integrating Identity as a Service with other service models
  • list the pros and cons of the Identity as a Service provider
  • describe presence information and how it is used in cloud systems
  • describe the components of a presence system
  • describe the processes and tools associated with a presence system
  • describe the security considerations for presence systems
  • describe the privacy concerns for cloud systems
  • describe the privacy policies and how they are implemented in cloud systems
  • describe the data life cycle in the context of cloud computing
  • describe the data security challenges in cloud computing
  • map the cloud security measures to the data life cycle stage to which they apply
  • describe the methods of controlling access to data stored on the cloud
  • Course Number: