Identity and Access Management (IAM) Governance for Managers: From Compliance Monitoring to Program Metrics
With Aamir Lakhani and Pearson
Liked by 21 users
Duration: 44m
Skill level: Beginner
Released: 1/7/2026
Course details
In this course, security expert Aamir Lakhani gives identity and access managers a clear roadmap for building and measuring an effective IAM governance program. Learn how to anchor your program to industry information security frameworks and standards, apply secure design principles, and account for physical and environmental security in governance plans. Discover how to create audit-ready compliance reports, navigate key regulations and certifications, and connect identity systems with applications and security tools to streamline monitoring and control. Each lesson translates governance requirements into practical steps and program metrics you can use to demonstrate control effectiveness and continuous compliance.
This course was created by Pearson. We are pleased to host this training in our library.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructors
Learner reviews
-
Dominique Angelucci
Dominique Angelucci
Technical Product Manager | Aligning teams w/vision, goals, strategy, roadmap, and releases | Building trust with colleagues and customers | SaaS…
Contents
What’s included
- Learn on the go Access on tablet and phone
Similar courses
-
1h 33m
Directory Services Management (DSM) for Identity and Access Managers (IAM): From User Provisioning to System Synchronization
-
1h 31m
Authentication Systems for Identity and Access Managers (IAM): From Multi-Factor Methods to Federation Services
-
59m
Access Control Implementation for Identity and Access Managers (IAM): From Role Design to Privileged Management