|
|
|||
|
||||
OverviewIn a world where breaches no longer start at the firewall but at the login screen, identity has become the new security perimeter. Mastering Identity and Access Management is the definitive guide for security leaders, engineers, cloud architects, and cyber professionals who need to secure modern infrastructures where users, devices, applications, and AI agents interact across hybrid and multi-cloud environments. This book delivers a complete, end-to-end blueprint for building, scaling, and optimizing enterprise IAM programs. Whether you're implementing Zero Trust, tightening cloud access, combating identity attacks, or aligning identity governance with business risk, this book gives you the practical frameworks, real-world playbooks, and hands-on examples needed to succeed. Designed for beginners and advanced practitioners alike, it provides clear explanations, deep technical guidance, and practical labs that show exactly how to deploy and operationalize IAM in real environments from Microsoft Entra ID and AWS IAM to Okta, SailPoint, CyberArk, and modern identity analytics tools. What You Will Learn- How to design IAM architectures for hybrid, multi-cloud, and SaaS-driven enterprises - Modern identity threats including MFA fatigue, token theft, session hijacking, and consent phishing-and how to detect and stop them - Practical Zero Trust identity strategies for authentication, authorization, and continuous verification - How to operationalize identity security with SIEM, SOAR, UEBA, and identity analytics - Building identity governance workflows, least-privilege models, and role engineering that actually work - Automation techniques using identity APIs, IaC, workflow engines, and cloud-native IAM tooling - How to build access behavior baselines, detect permission drift, and implement AI-powered identity risk scoring - The complete blueprint for building an IAM operating model, funding strategy, and 12-24 month transformation plan Who This Book Is ForThis book is written for: - Cybersecurity professionals and SOC analysts - Cloud engineers and architects (AWS, Azure, GCP) - Identity engineers, IAM administrators, and governance teams - Security leaders, CISOs, and tech managers - DevSecOps and automation practitioners - Students, career-changers, and anyone who wants to master IAM Whether you're developing your first IAM roadmap or refining an enterprise-scale identity program, you'll gain actionable best practices, implementation patterns, and modern security insights that reflect today's identity-first world. Why This Book Stands OutUnlike traditional IAM books that focus only on technology, this guide blends strategy, architecture, hands-on engineering, and real-world security operations. You'll learn not just what IAM is, but how to deploy it, automate it, monitor it, and mature it. Featuring practical labs, architecture diagrams, attack detection playbooks, identity governance workflows, and cloud-specific deployment patterns, this book becomes your complete IAM playbook, ready to use in enterprise environments. Full Product DetailsAuthor: Evan ArtexPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.80cm , Height: 1.70cm , Length: 25.40cm Weight: 0.569kg ISBN: 9798276724317Pages: 326 Publication Date: 30 November 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||