Author
Released
2/13/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Provisioning and deprovisioning
- Dealing with identity security issues
- Multifactor authentication
- How password authentication works
- RADIUS and TACACS
- Mandatory access and discretionary access controls
- Account and password policies
Skill Level Advanced
Duration
Views
- We can only implement secure systems if we have controls that are able to securely identify and authenticate users, and then limit those users to carrying out only authorized activities. That's the role of identity and access management systems. Cybersecurity professionals must understand how these systems carry out their functions, how administrators configure access controls to restrict access, and how attackers might exploit access control weaknesses. Businesses in all industries need skilled cybersecurity analysts who understand identity and access management. Comptia Cybersecurity Analyst Plus, or CYSA Plus Certification, is a path that many technologists follow to advance their careers in this high demand field. Hi, I'm Mike Chapple, and I'd like to invite you to watch my course on identity and access management. It's part of an eight core series preparing you for the CYSA Plus exam. I hope that you'll join me as we explore the important field of identity and access management.
Related Courses
-
Learning Vulnerability Management
with Lora Vaughn53m 54s Beginner -
Learning Threat Modeling for Security Professionals
with Adam Shostack41m 41s Intermediate
-
Introduction
-
Study resources1m 29s
-
1. Identity and Access Management
-
Subject/object model2m 45s
-
Identity security issues2m 18s
-
2. Identification
-
User names and access cards3m 27s
-
Biometrics2m 35s
-
-
3. Authentication
-
Authentication factors3m 30s
-
Multi-factor authentication2m 33s
-
Something you have3m 15s
-
RADIUS and TACACS3m 37s
-
Kerberos and LDAP5m 13s
-
SAML2m 38s
-
IDaaS3m 11s
-
-
4. Authorization
-
Mandatory access controls3m 47s
-
Access control lists (ACL)5m 14s
-
5. Identity Management Life Cycle
-
Account policies3m 36s
-
Password policies4m 50s
-
Role management3m 56s
-
Account monitoring2m 16s
-
Conclusion
-
Next steps40s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Identity and access management