- [Instructor] Identity and access management controls…play an important role in any organization's…information security program.…Identity and access management…is the practice of ensuring that computer systems…have a clear picture of the identity…of each individual or resource…authorized to access the system,…and that the system can control access…in a way that prevents unauthorized individuals…from accessing resources while permitting…authorized individuals to perform legitimate actions.…
The concept of identity can be a little confusing…when discussed in the theoretical language…of identity and access management professionals.…Let's take a look at some of the terminology…commonly used in this field…by using an example from a college campus.…First, an entity is the foundation of the identity model.…In the case of people, an entity is…an actual physical person.…Here we have two person entities, Alice and Bob.…Each entity may have one or more identities.…
In the case of people, identities normally correspond…to roles that an individual plays within an organization.…
Author
Updated
10/27/2020Released
11/15/2018- Building a security team
- Conducting a gap analysis
- Improving personnel security
- File permissions and data encryption
- Cloud computing and virtualization
- Host-based network security controls
- Securing mobile devices
- Choosing encryption algorithms
- Physical and network security
- Biometrics and multifactor authentication
- Development methodologies
Skill Level Intermediate
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
Implementing an Information Security Program
with Kip Boyle2h 33m Intermediate -
IT Security: Key Policies and Resources
with Gregory Michaelidis23m 44s Intermediate -
CISM Cert Prep: 1 Information Security Governance
with Mike Chapple1h 50m Intermediate
-
Introduction
-
Study resources1m 23s
-
1. Information Security Program Development
-
Scope and charter3m 32s
-
Building a security team3m 16s
-
Conducting a gap analysis3m 12s
-
-
2. Personnel Security
-
Employee termination process2m 43s
-
Employee privacy2m 23s
-
Social networking3m 52s
-
3. Data Security Controls
-
File permissions10m 20s
-
Data encryption6m 21s
-
-
4. Cloud Computing and Virtualization
-
Virtualization4m 21s
-
Cloud computing models3m 44s
-
Public cloud tiers5m 35s
-
Cloud storage security5m 17s
-
-
5. Host Security
-
Operating system security4m 35s
-
Malware prevention8m 54s
-
Application management6m 48s
-
Hardware security4m 13s
-
-
6. Mobile Security
-
Mobile device security2m 35s
-
Mobile device management6m 14s
-
Mobile device tracking3m 14s
-
Mobile application security4m 22s
-
-
7. Cryptography
-
Understanding encryption3m 24s
-
Goals of cryptography3m 47s
-
The cryptographic life cycle2m 49s
-
Key exchange3m 4s
-
Diffie–Hellman5m 10s
-
Key escrow3m 13s
-
Key stretching1m 55s
-
Trust models3m 2s
-
PKI and digital certificates4m 28s
-
Hash functions9m 11s
-
Digital signatures4m 4s
-
TLS and SSL4m 1s
-
IPsec3m
-
Securing common protocols6m 30s
-
-
8. Physical Security
-
Physical access control3m 58s
-
Visitor management1m 35s
-
9. Network Security
-
Routers and switches2m 31s
-
Firewalls4m 20s
-
VPNs and VPN concentrators2m 55s
-
Unified threat management1m 54s
-
Network access control4m 15s
-
Remote network access5m 18s
-
-
10. Identity and Access Management
-
Usernames and access cards3m 27s
-
Authentication factors3m 30s
-
Biometrics2m 35s
-
Multifactor authentication2m 33s
-
Something you have3m 15s
-
11. Asset Management
-
12. Personnel Safety
-
Employee safety2m 26s
-
Emergency management2m 14s
-
-
13. Software Security
-
Application security4m 16s
-
Development methodologies6m 17s
-
Maturity models3m 34s
-
Risk analysis and mitigation3m 43s
-
Software testing3m 11s
-
Acquired software3m 7s
-
-
Conclusion
-
What's next?44s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Identity and access management