arrow_back
Introduction To The Non-Human Identity Foundation Level Course
Introduction To The Non-Human Identity Foundation Level Course
Course Outline
Module 1: Introduction To Identity Security
Introduction To Module 1
1.1 Evolution from Traditional Security to Identity-Centric Security
1.2 What Is An Identity & The Pillars Of Identity Security?
1.3 Identity as the New Security Perimeter
1.4 Modern Threats and the Identity Attack Chain
1.5 Identity Security Trends
1.6 Final Insights
1.7 Module 1 Quiz
Module 2: What Are Non-Human Identities (NHIs) & Their Criticality?
Introduction To Module 2
2.1 What Are Non-Human Identities?
2.2 Difference between Identity, Credential and Secret
2.3 Why Are NHIs Growing So Fast?
2.4 Human vs. Non-Human Identity: Key Differences
2.5 Why Securing NHIs Is Essential to Organisations’s Security?
2.6 Final Insights
2.7 - BONUS - NHI Overview Animated Video
2.8 Module 2 Quiz
Module 3: Where NHIs Exist And How They Are Managed
Introduction To Module 3
3.1 Where Do NHIs Exist?
3.2 What Do NHIs Look Like?
3.3 How Do NHIs Get Created?
3.4 How Are NHIs Typically Managed Today?
3.5 Final Insights
3.6 Module 3 Quiz
Module 4: NHIs Security Risks And Challenges
Introduction To Module 4
4.1 Key Challenges of Non-Human Identities (NHIs)
4.2 The Key Risks/Issues of Non-Human Identities (NHIs)
4.3 - BONUS - Top-10 Risks / Issues Animated Video
4.4 Static vs Dynamic Credentials
4.5 Final Insights
4.6 - BONUS - OWASP NHI Top-10 Risks/Issues
4.7 Module 4 Quiz
Module 5: NHI Lifecycle Management
Introduction To Module 5
5.1 What Is the NHI Lifecycle Process?
5.2 Provisioning & Decommissioning
5.3 Discovery & Inventory
5.4 Classification
5.5 Posture Management
5.6 Securing Credentials
5.7 Monitoring Controls
5.8 Prevent Controls
5.9 Final Insights
5.10 Module 5 Quiz
Module 6: NHI Security Hygiene & Best Practices
Introduction To Module 6
6.1 What Is NHI Security Hygiene?
6.2 Best Practices for Each NHI Lifecycle Stage
6.3 Final Insights
6.4 Module 6 Quiz
Module 7: Modern Techniques For Managing NHIs
Introduction To Module 7
7.1 Static Credentials: The Old Foundation
7.2 Dynamic Ephemeral Credentials
7.3 Just-in-Time Access (JIT) & Zero Standing Privileges (ZSP)
7.4 Video - OAuth 2.0 And OIDC
7.5 OAuth 2.0 and OpenID Connect (OIDC)
7.6 Video - SPIFFE / SPIRE
7.7 SPIFFE and SPIRE Standard
7.8 Final Insights
7.9 Module 7 Quiz
Module 8: Lessons Learned From Real World NHI breaches
Introduction To Module 8
8.1 OmniGPT Breach - 34M Conversations Exposed
8.2 DeepSeek Breach
8.3 BeyondTrust Breach Causes Major Incident At US Treasury
8.4 How ASP.NET Machine Keys Triggered Remote Code Execution Attacks
8.5 Snowflake Breach
8.6 Lessons Learned
8.7 Final Insights
8.8 - BONUS - A Practitioners Guide to Managing NHI Risks
8.9 Module 8 Quiz
Module 9: Agentic AI And The Intersection With NHIs
Introduction To Module 9
9.1 What Is Agentic AI?
9.2 How Agentic AI Works & Key Use Cases
9.3 Benefits Of Agentic AI
9.4 The Intersection With NHIs
9.5 Challenges And Risks Of Agentic AI
9.6 Agentic AI Infrastructure
9.7 The Future of Agentic AI
9.8 Final Insights
9.9 Module 9 Quiz
Module 10: What Should Organisations Do Now?
Introduction To Module 10
10.1 Top 10 Practices to Start With Now
10.2 Final Insights
Module 11: Course Review And Final Exam
Introduction To Module 11
11.1 Congratulations!
11.2 Final Exam
11.3 NHI Foundation Level Certification
Preview - NHI Foundation Level Course & Exam
Discuss (
0
)
navigate_before
Previous
Next
navigate_next