Identity Security

Identity & Access Management Labs

Identity Security Lab Overview

Category Labs
Identity & Access Management 2
Endpoint Security & Hardening 1
Total Identity Security Labs Documented 3

These labs highlight critical identity and access management (IAM) techniques, focusing on protecting user data, implementing least-privilege access, and ensuring administrative control over system resources.

Identity security focuses on controlling how users authenticate to systems and how permissions are enforced across infrastructure. The labs in this section demonstrate practical experience implementing access controls, monitoring identity activity, and securing system endpoints within Windows and Linux environments.

These exercises emphasize enforcing least-privilege access, monitoring system behavior, and protecting administrative control mechanisms used to manage users and permissions.


Identity & Access Management

Identity and Access Management (IAM) ensures that only authorized users can access systems and sensitive resources. These labs demonstrate how administrative controls, monitoring tools, and system configurations are used to protect identities and enforce secure access policies.

Lab Index

  • GUIDE – Using Access Permissions and Rights to Secure a Folder – v1.0.0

    This guide demonstrates how Windows file system permissions can be configured to protect sensitive directories and enforce least-privilege access policies.

    Skills Demonstrated: NTFS permission management, access control enforcement, least-privilege implementation, file system security configuration


  • GUIDE – Monitoring Windows Processes with Procmon – v1.0.1

    This guide demonstrates how Process Monitor can be used to observe system activity, track process behavior, and analyze interactions between applications and system resources.

    Skills Demonstrated: Process monitoring, system activity analysis, windows diagnostics, security troubleshooting


  • GUIDE – Endpoint Security with the Windows Registry – v1.0.0

    This guide demonstrates how security configurations can be enforced through the Windows Registry to strengthen endpoint protection and restrict unauthorized changes.

    Skills Demonstrated: Registry security configuration, endpoint hardening, system policy enforcement, windows security administration


Identity Security Concepts Demonstrated

The labs in this section highlight several important principles used in enterprise identity security.

  • Least Privilege Access Control
    Ensuring users receive only the permissions required to perform their tasks.

  • Identity Monitoring
    Observing system activity and process behavior to detect unauthorized access or suspicious actions.

  • Endpoint Hardening
    Protecting authentication mechanisms and administrative controls through secure configuration.

  • Administrative Security Controls
    Managing system permissions and configuration settings to prevent privilege misuse.


Portfolio Documentation

This section highlights hands-on work related to identity protection, access control enforcement, and endpoint security configuration. These exercises simulate real-world administrative tasks where protecting user identities and restricting system access are critical to maintaining secure infrastructure.

Additional lab documentation, configuration notes, and system monitoring records are maintained within the full research archive and are available upon request for professional review.