Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Primary-source-grounded cybersecurity course
A primary-source-grounded six-module path into IAM engineering and architecture: digital identity assurance per NIST SP 800-63, the OAuth 2.0 and OpenID Connect protocols, SAML 2.0, FIDO2/WebAuthn, zero-trust identity, and the IAM career ladder.
Identity and Access Management Fundamentals is a 6-module cybersecurity course for security engineers, IT engineers, and developers moving into IAM engineering or architecture roles. Every module is grounded in primary-source standards: NIST SP 800-63-3 Digital Identity Guidelines (Grassi et al. 2017, Revision 4 in active development as of 2024), NIST SP 800-207 Zero Trust Architecture (Rose et al. 2020), NIST SP 800-162 Attribute-Based Access Control Guide (Hu et al. 2014), the OAuth 2.0 RFC 6749 (Hardt 2012) and OpenID Connect Core 1.0 (Sakimura et al. 2014), SAML 2.0 OASIS specifications (2005), and FIDO2 with W3C WebAuthn (2019). The course covers identity proofing and authenticator assurance, federated authentication via SAML and OIDC, modern phishing-resistant MFA via FIDO2, the privilege-management primitives that produce least-privilege IAM, and the workforce-identity blast-radius problem. Designed by Julian Calvo, Ed.D. in Applied Learning Sciences (University of Miami, 2026).
The course sequences six modules around the IAM operational lifecycle: identity proofing, authentication, federation, authorization, privileged access, and lifecycle management. Each module pairs a primary-source standard with a hands-on artifact: read the standard, configure a real federated identity flow against a free-tier identity provider (Microsoft Entra External ID, Okta Workforce or Auth0 free tier, Google Cloud Identity), document the security review the way an IAM engineering team would expect to see it. The pedagogical pattern follows Kolb's experiential learning cycle (1984): concrete IAM configuration, structured reflection against the standard, abstract conceptualization through the protocol specification, then active experimentation in the free-tier environment. Every claim cites NIST, an IETF or OASIS specification, the FIDO Alliance, BLS, ISC2, or peer-reviewed research. No identity-vendor white paper without primary-source backing.
Module 01 · 130 min
What identity assurance, authenticator assurance, and federation assurance levels mean per NIST SP 800-63-3, why the stack is the most-cited US Government identity standard, and how to apply it to a real authentication flow.
Module 02 · 140 min
What OAuth 2.0 actually is (delegated authorization, not authentication), how OpenID Connect adds authentication on top, and why misunderstanding the distinction is the most common IAM engineering error.
Module 03 · 110 min
Why SAML 2.0 still dominates enterprise workforce SSO, what the SP-initiated and IdP-initiated flows look like, and how to read a SAML response message.
Module 04 · 120 min
Why phishing-resistant MFA matters more than any other authentication control, what FIDO2 and WebAuthn actually do, and how to deploy them at organizational scale.
Module 05 · 110 min
What least privilege actually means in practice, how PAM (Privileged Access Management) systems implement it, and the difference between standing privilege and just-in-time elevation.
Module 06 · 100 min
What the IAM engineer, IAM architect, IAM program manager, and identity-platform-engineering ladder looks like, the credentials hiring managers price into the offer, and the BLS, ISC2, and CIAM industry data behind compensation.
This course is for educational purposes only. IAM decisions affect access to production systems and personal data; readers must adapt course content to the specific platform, threat model, and regulatory context of the consuming organization. NIST publications cited here are public-domain US Government works. IETF RFCs and OASIS / W3C specifications are open standards. FIDO2 and WebAuthn specifications are public. AWS, Microsoft Entra, Okta, Auth0, Google Cloud Identity, and other named platforms are trademarks of their respective owners. DecipherU is not affiliated with any IAM vendor.