Author
Released
3/12/2021Skill Level Advanced
Duration
Views
- Hi, I'm Mike Chapple. And I'd like to welcome you to our CISSP Identity and Access Management course. The Certified Information Systems Security Professional, or CISSP certification, is the gold standard for information security certification. You'll find that it's a core requirement for many mid and senior level information security positions. Earning the CISSP requires demonstrating that you have sufficient work experience and passing an exam covering the eight domains of information security. This course covers the fifth of those eight domains; identity and access management. 13% of the questions on the CISSP exam come from this domain. I have two decades of experience as an information security professional, and I've been involved in CISSP training and certification for most of those. As we work our way through this course, we'll focus on each topic covered by domain five. We'll review how to control physical and logical access to information and information systems. We'll also cover managing secure identification, authentication, and authorization processes. You'll learn how you can prevent or mitigate access control attacks. And that's just a small sampling of the many topics covered in this course. These topics, combined with the information you learn in our other CISSP courses, will help you pass the CISSP exam and also provide a critical foundation for your career in information security.
Related Courses
-
Introduction
-
Study resources1m 58s
-
1. Identification
-
Usernames and access cards3m 23s
-
Biometrics2m 42s
-
2. Authentication
-
Authentication factors4m 35s
-
Multifactor authentication2m 35s
-
Something you have4m 24s
-
RADIUS and TACACS3m 43s
-
Kerberos and LDAP5m 18s
-
SAML2m 35s
-
OAuth and OpenID Connect2m 55s
-
-
3. Accountability
-
Accountability2m 41s
-
Session management1m 50s
-
-
4. Account Management
-
Account types3m 52s
-
Account policies3m 31s
-
Password policies4m 19s
-
Manage roles3m 44s
-
Account monitoring3m 48s
-
Privileged access management3m 30s
-
5. Authorization
-
Understand authorization4m 3s
-
Mandatory access controls2m 34s
-
Access control lists4m 50s
-
Database access control4m 4s
-
-
6. Access Control Attacks
-
Social engineering5m 29s
-
Impersonation attacks5m 22s
-
Watering hole attacks2m 54s
-
Physical social engineering2m 31s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Identity and access management