CISSP 2021: Deploying Identity & Access Management (IAM)

CISSP 2021    |    Expert
  • 12 Videos | 49m 13s
  • Includes Assessment
  • Earns a Badge
If implemented properly, Identity Access Management mechanisms and protocols can greatly improve an enterprise's visibility and security. This course will help you delve deeper into the practical implementation of identity and access management controls and mechanisms. Explore the implementation of authentication systems like SAML, investigate the management of the identity and access provisioning lifecycle, and discover how the identification of people, devices, and services are managed. You'll also examine authentication and authorization protocols, provisioning and deprovisioning, and accounting, registration, and proofing of identity. After finishing this course, you'll have an understanding of how to effectively use and execute identity and access mechanisms within your organization. Moreover, you can also use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the RADIUS and TACACS+ AAA protocol operations
    define Security Assertion Markup Language (SAML) 2.0 and its practical implementation
    compare OpenID Connect (OIDC) and Open Authorization (Oauth) and how they can function together and standalone in modern environments
    describe the MIT Kerberos protocol and operation specifically in an Active Directory (AD) enterprise
    discuss provisioning and deprovisioning entities as in on/off-boarding and transfer operations
  • examine the definition and assignment of roles and the management of people assigned to new roles
    review user, system, and service account access in an enterprise
    manage elevation (or escalation) of privileges of managed service accounts, use of sudo, and minimizing privilege creep
    implement Identity Management (IdM) and Multi-Factor Authentication (MFA) processes
    manage mechanisms like accounting, session management, registration, proofing, FIM, credential management, SSO, and JIT
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 27s
    UP NEXT
  • Playable
    2. 
    RADIUS and TACACS+
    5m 6s
  • Locked
    3. 
    Security Assertion Markup Language (SAML)
    4m 18s
  • Locked
    4. 
    OpenID Connect (OIDC) and Open Authorization (Oauth)
    3m 44s
  • Locked
    5. 
    Kerberos
    3m 26s
  • Locked
    6. 
    Provisioning and Deprovisioning
    5m 21s
  • Locked
    7. 
    Role Definition
    5m 36s
  • Locked
    8. 
    Account Access Review
    2m 47s
  • Locked
    9. 
    Privilege Escalation
    1m 44s
  • Locked
    10. 
    Implementing IdM and MFA
    5m 37s
  • Locked
    11. 
    Managing Identification and Authentication Mechanisms
    4m 25s
  • Locked
    12. 
    Course Summary
    43s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.