About the CIAM® Course
The Certified Identity and Access Manager (CIAM)® exam preparation video course offers a comprehensive, on-demand training program designed for professionals seeking to master Identity and Access Management (IAM) and earn the CIAM® certification.
Structured into 10 chapters, this course aligns with the 10 CIAM Critical Risk Domains, providing in-depth coverage.
Through content that follows the official CIAM study guide published by the Identity Management Institute with a focus on exam preparation, learners will gain the knowledge and confidence to design, implement, and manage secure, compliant, and risk-aware IAM programs. This course is also ideal for IAM practitioners, security leaders, auditors, and consultants who want to advance their careers and demonstrate expertise in modern identity management.
What you will learn
In this course, we will explore the key risk domains that determine whether identity and access management works in practice.
We begin with strategy and governance, because without clear direction, ownership, and decision-making, every other control becomes inconsistent.
We then examine program management, as weak planning, inconsistent funding, and poor delivery are major sources of identity risk that determine whether initiatives succeed or quietly fail over time.
You will learn how lifecycle and transformation shape access as people join, move, and leave, and why access must be treated as a continuous process rather than a one-time event.
We will examine access requests and approval to understand how decisions are made and how poor approval design creates hidden risk.
Provisioning and deprovisioning will show how access is technically granted and removed, and why failures here are among the most common causes of incidents.
Enforcement will focus on how policies are applied at runtime and why rules without enforcement create a false sense of security.
Auditing and reporting will demonstrate how organizations prove that controls exist and are working, not just documented.
Access review and recertification will highlight the primary corrective control in identity and access management and the risks of ineffective reviews.
Account reconciliation will reveal where authorized access and actual access diverge and how that divergence exposes systemic weaknesses.
Finally, we will look at tools not as solutions in themselves, but as enablers that must support sound processes, governance, and risk decisions.
Throughout this training, the focus is not on theory or products, but on real-world risk, practical control failures, and how to recognise them early.
By the end, you will see identity and access management not as a collection of features, but as a set of critical risk domains that must work together to protect the organization.