Course Outline
Introduction
- Beyond usernames and passwords in the Telecommunications Industry
How Identity is Managed by Telecom Companies
Overview of Digital Identity Solutions and Providers
The Role of Mobile in Digital Identity
Setting up a Digital Identity System
Integrating Different Communication Gateways
Understanding the Authentication Process
Implementing a Multifactor Identification System
Enabling a Single Sign-On System
Enabling a Passwordless Sign-On System
Logging in From Different Types of Devices
Setting up Social Authentication
Detecting Anomalous Sign-On Activity
Extending a System through APIs
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of security concepts.
- Experience with telecommunications customer information systems.
Audience
- Network engineers
- Developers
- Telecommunications managers and technicians
Testimonials (6)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working. He answer to all questions raised. Very available.
christel salve - BICS
Course - Blockchain for Telecom
examples based on our data
Witold - P4 Sp. z o.o.
Course - Deep Learning for Telecom (with Python)
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course - OpenStack for Telecom
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.