CompTIA Cloud+: Cloud Identity & Access Management
CompTIA Cloud+
| Intermediate
- 12 Videos | 1h 13m 28s
- Includes Assessment
- Earns a Badge
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe how to configure identity and access management (IAM) including identification, authorization, and privileged access managementdescribe how to use the Lightweight Directory Access Protocol (LDAP) to manage access to resourcesdescribe how identity federation can be used to manage user identitiesdescribe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival serversdescribe how multi-factor authentication (MFA) can be used for access control
-
describe how single sign-on (SSO) can be used to reduce the need to sign on to multiple systemsdescribe how Public Key Infrastructure (PKI) is used to create, manage, distribute, use, store, and revoke digital certificatesdescribe how secret and key management can be used to centrally manage security keysdescribe the components that can be used to perform incident response preparationdescribe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysissummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 14sUP NEXT
-
2.Cloud Identification and Authorization7m 47s
-
3.Cloud Directory Services9m 16s
-
4.Identity Federation6m 49s
-
5.Certificate Management9m 33s
-
6.Multi-factor Authentication5m 56s
-
7.Single Sign-on5m 35s
-
8.Public Key Infrastructure6m 26s
-
9.Cloud Secret and Key Management6m 55s
-
10.Incident Response Preparation6m 7s
-
11.Incident Response Procedures6m 1s
-
12.Course Summary50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.