CISSP 2021: Identity and Access Management Principles

CISSP    |    Expert
  • 11 videos | 34m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 64 users Rating 4.6 of 64 users (64)
Identity and access management (IAM) is crucial for businesses in order to identify and mitigate security violations, define user identity, and manage access privileges and authorization. Gain a better understanding of critical concepts, terms, and models needed to build a strong foundation in IAM using this course. Explore different areas of physical and logical control and learn more about security models like Biba and Bell-LaPadula. You will also delve deeper into authorization mechanisms, such as MAC, RBAC, DAC, and ABAC. You will have a better understanding of authentication and authorization fundamentals after completing this course. Further, you can also use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Control physical and logical access to assets, such as information, systems, applications, devices, and facilities
    Compare the shared responsibility identity models of on-premises, cloud, and hybrid
    Recognize the concepts of security models, such as biba, star, and bell-lapadula
    Identify features of the role-based access control (rbac) authorization mechanism
    Outline features of the rule-based access control authorization mechanism
  • Describe characteristics of the mandatory access control (mac) authorization mechanism
    Recognize features of the discretionary access control (dac) authorization mechanism
    Outline features of the attribute-based access control (abac) authorization mechanism
    Describe features of the risk-adaptable access control (radac) authorization mechanism
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 35s
  • 3m 55s
  • Locked
    3.  Cloud and Third-party Identity Models
    8m 22s
  • Locked
    4.  Security Models
    7m 2s
  • Locked
    5.  Role-based Access Control (RBAC)
    2m 43s
  • Locked
    6.  Rule-based Access Control
    2m 45s
  • Locked
    7.  Mandatory Access Control (MAC)
    1m 40s
  • Locked
    8.  Discretionary Access Control (DAC)
    1m 51s
  • Locked
    9.  Attribute-based Access Control (ABAC)
    1m 29s
  • Locked
    10.  Risk-adaptable Access Control (RAdAC)
    2m 40s
  • Locked
    11.  Course Summary
    42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 93 users Rating 4.6 of 93 users (93)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 87 users Rating 4.6 of 87 users (87)
Rating 4.7 of 60 users Rating 4.7 of 60 users (60)
Rating 4.4 of 41 users Rating 4.4 of 41 users (41)