CompTIA Cloud+: Cloud Identity & Access Management

CompTIA Cloud+    |    Intermediate
  • 12 Videos | 1h 18m 28s
  • Includes Assessment
  • Earns a Badge
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe how to configure identity and access management (IAM) including identification, authorization, and privileged access management
    describe how to use the Lightweight Directory Access Protocol (LDAP) to manage access to resources
    describe how identity federation can be used to manage user identities
    describe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers
    describe how multi-factor authentication (MFA) can be used for access control
  • describe how single sign-on (SSO) can be used to reduce the need to sign on to multiple systems
    describe how Public Key Infrastructure (PKI) is used to create, manage, distribute, use, store, and revoke digital certificates
    describe how secret and key management can be used to centrally manage security keys
    describe the components that can be used to perform incident response preparation
    describe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysis
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 14s
    UP NEXT
  • Playable
    2. 
    Cloud Identification and Authorization
    7m 47s
  • Locked
    3. 
    Cloud Directory Services
    9m 16s
  • Locked
    4. 
    Identity Federation
    6m 49s
  • Locked
    5. 
    Certificate Management
    9m 33s
  • Locked
    6. 
    Multi-factor Authentication
    5m 56s
  • Locked
    7. 
    Single Sign-on
    5m 35s
  • Locked
    8. 
    Public Key Infrastructure
    6m 26s
  • Locked
    9. 
    Cloud Secret and Key Management
    6m 55s
  • Locked
    10. 
    Incident Response Preparation
    6m 7s
  • Locked
    11. 
    Incident Response Procedures
    6m 1s
  • Locked
    12. 
    Course Summary
    50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE