CompTIA Cloud+: Cloud Identity & Access Management

CompTIA    |    Intermediate
  • 12 videos | 1h 13m 28s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 41 users Rating 4.5 of 41 users (41)
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to configure identity and access management (iam) including identification, authorization, and privileged access management
    Describe how to use the lightweight directory access protocol (ldap) to manage access to resources
    Describe how identity federation can be used to manage user identities
    Describe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers
    Describe how multi-factor authentication (mfa) can be used for access control
  • Describe how single sign-on (sso) can be used to reduce the need to sign on to multiple systems
    Describe how public key infrastructure (pki) is used to create, manage, distribute, use, store, and revoke digital certificates
    Describe how secret and key management can be used to centrally manage security keys
    Describe the components that can be used to perform incident response preparation
    Describe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysis
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 14s
    The CompTIA Cloud+ certification is targeted at IT infrastructure specialist audiences who want to develop multi-vendor skills in the areas of cloud computing, including the movement of applications, databases, workflows, and systems to the cloud. This certification addresses system architecture, security, deployment, operations, and automation, and aims to prepare system administrators to perform the tasks required of their job, not just to rely on a narrow set of vendor-specific product features and functions. FREE ACCESS
  • 7m 47s
    In this video, you'll learn the key terms related to identity management and resource access control. You will learn about authentication and authorization. You'll learn that with a cloud-based software approach, establishing authentication is usually performed by a variety of HTTP-based protocols. This means the identity of a user, device, or a service can be presented to the cloud authentication system to confirm the identity of the entity requesting access. FREE ACCESS
  • Locked
    3.  Cloud Directory Services
    9m 16s
    In this video, you’ll learn about the implementation of cloud directory services and how the Lightweight Directory Access Protocol, or LDAP, fits into managing a cloud environment. You’ll learn that the LDAP is used to access or manage an existing directory service and build a directory if necessary. You’ll discover a directory service is a database of objects that are managed collectively as a unit. FREE ACCESS
  • Locked
    4.  Identity Federation
    6m 49s
    In this video, you'll learn about Identity Federation in cloud services, which provides you with another means to manage identities. You’ll learn that the primary components of an Identity Federation are an identity provider and a service provider. You’ll also learn that an identity provider verifies the credentials and if successful, grants an access token and then the user can access the app. FREE ACCESS
  • Locked
    5.  Certificate Management
    9m 33s
    In this video, you’ll take a look at certificate management and how it relates to various aspects of securing identities and resources. You’ll learn about several components involved with certificate management beginning with Certificate Stores, which include a Trusted Root Certification Authority store, a Trusted publisher store and a local computer store. You’ll learn that these stores refer to a storage location for certificates that are managed by or issued to that particular entity. FREE ACCESS
  • Locked
    6.  Multi-factor Authentication
    5m 56s
    In this video, you’ll learn about Multi-factor Authentication, which is a means to further secure the authentication process by requiring a user to prove their identity, by presenting at least two or more pieces of evidence. You’ll discover that while Multi-factor Authentication might still use your password, it will also require something else, such as a code to your mobile phone via a text message that has to be entered. FREE ACCESS
  • Locked
    7.  Single Sign-on
    5m 35s
    In this video, you’ll learn about the use of Single Sign-on, or SSO, for use with cloud services, which means that once a user has completed a secure authentication by logging in, they are then able to access multiple applications or services using that single set of credentials. You’ll learn this means once a user is logged in, they won’t have to continually provide their credentials each time they want to access a different service. FREE ACCESS
  • Locked
    8.  Public Key Infrastructure
    6m 26s
    In this video, you’ll learn about the use of Public Key Infrastructure or PKI, which represents a collection of hardware, software, policies, and procedures that are combined to produce a digital certificate that can be used to establish a trusted identity for a service principal or the identity of a computer such as a web server. You’ll also learn how to implement encryption using public and private keys to secure communications between devices. FREE ACCESS
  • Locked
    9.  Cloud Secret and Key Management
    6m 55s
    In this video, you’ll learn about Cloud Key Management methods. You’ll learn how these methods provide better security for the cryptographic keys that represent the algorithms used to secure communications and information. You will also learn how to protect the keys. And you’ll discover that the means by which you implement your Key Management can vary. FREE ACCESS
  • Locked
    10.  Incident Response Preparation
    6m 7s
    In this video, you’ll learn more about preparing and implementing an Incident Response Plan. You’ll discover this is especially necessary if you are going to create a cloud service that is intended to be consumed by your customers. You’ll learn that an Incident Response Plan can take a variety of forms but must be a documented plan that assumes incidents will happen and details the process of dealing with them. FREE ACCESS
  • Locked
    11.  Incident Response Procedures
    6m 1s
    In this video, you will learn more about incident response procedures. This video will outline the actual steps that should be taken to fully resolve an issue. You’ll learn that all steps must be documented for future reference and that the documentation should begin right away and continue throughout the process until the issue is resolved. Plus, you’ll learn why this documentation is so important. FREE ACCESS
  • Locked
    12.  Course Summary
    50s
    In this video, you will summarize what you’ve learned in the course. This course has covered Cloud Identity and Access Management and incident response preparation and response procedures. You explored configuring identity and access management, the use of the Lightweight Directory Access Protocol, using federation to manage user identities, certificate management concepts, multi-factor authentication, single sign-on, and public key infrastructure, cloud secret and key management, and incident response, preparation and procedures. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 87 users Rating 4.5 of 87 users (87)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1418 users Rating 4.6 of 1418 users (1418)
Rating 4.7 of 25 users Rating 4.7 of 25 users (25)
Rating 4.3 of 29 users Rating 4.3 of 29 users (29)