Course Outline
Introduction
- Beyond usernames and passwords in the Telecommunications Industry
How Identity is Managed by Telecom Companies
Overview of Digital Identity Solutions and Providers
The Role of Mobile in Digital Identity
Setting up a Digital Identity System
Integrating Different Communication Gateways
Understanding the Authentication Process
Implementing a Multifactor Identification System
Enabling a Single Sign-On System
Enabling a Passwordless Sign-On System
Logging in From Different Types of Devices
Setting up Social Authentication
Detecting Anomalous Sign-On Activity
Extending a System through APIs
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of security concepts.
- Experience with telecommunications customer information systems.
Audience
- Network engineers
- Developers
- Telecommunications managers and technicians
Testimonials
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
The delivery
- Department for Communities
Depth and breadth of the course. Trainer was excellent also.
- Department for Communities
Examples provided
- Department for Communities
Trainer's vast knowledge
FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O.
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.