CompTIA Security+: Implementing Identity and Account Management & AAA Solutions

CompTIA    |    Intermediate
  • 10 videos | 52m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 158 users Rating 4.3 of 158 users (158)
Identity and access management (IAM) is used to protect your data by ensuring the right users have access to the right resources. This CompTIA Security+ SY0-601 course covers various identity controls including identity providers, attributes, certifications, tokens, and SSH keys. It also discusses the use of different account types and common account policies, and authentication management techniques such as password keys, password vaults, TPM, HSM, and knowledge-based authentication. Finally, you learn about protocols and services used for federation and single sign-on, and access control schemes like ABAC, DAC, RBAC, and MAC. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe various identity controls such as identity providers, attributes, certificates, tokens, ssh keys, and smart cards
    Define different account types as in user, shared, generic, guest, and service accounts
    Configure common account policies for aws identity and access management
    Describe advanced account policy methods such as time of day, network location, geofencing, geotagging, and geolocation
  • Describe various authentication management techniques like password keys, password vaults , tpm, hsm, and knowledge-based authentication
    Survey common authentication protocols such as eap-chap, password authentication protocol, 802.1x, and radius
    Survey protocols and services used for federation and single-sign-on like saml 2.0, tacacs+, oauth, oidc, and kerberos
    Describe access control schemes like attribute-based access control, role-based access control, rule-based access control, mandatory access control, and discretionary access control
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 29s
  • 3m 47s
    Upon completion of this video, you will be able to describe various identity controls, such as identity providers, attributes, certificates, tokens, SSH keys, and smart cards. FREE ACCESS
  • Locked
    3.  Account Types
    6m 11s
    During this video, you will learn how to define different account types, such as user, shared, generic, guest, and service accounts. FREE ACCESS
  • Locked
    4.  Common Account Policies
    7m 12s
    In this video, you will learn how to configure common account policies for Amazon Web Services Identity and Access Management. FREE ACCESS
  • Locked
    5.  Advanced Account Policies
    3m 18s
    Upon completion of this video, you will be able to describe advanced account policy methods such as time of day restrictions, network location restrictions, geofencing, geotagging, and geolocation. FREE ACCESS
  • Locked
    6.  Authentication Management
    5m 32s
    After completing this video, you will be able to describe various authentication management techniques like password keys, password vaults, TPM, HSM, and knowledge-based authentication. FREE ACCESS
  • Locked
    7.  Common Authentication Protocols
    9m 9s
    In this video, learn how to survey common authentication protocols such as EAP-CHAP, password authentication protocol, 802.1x, and RADIUS. FREE ACCESS
  • Locked
    8.  Authentication Protocols for Federation and SSO
    8m 5s
    In this video, find out how to survey protocols and services used for federation and single-sign-on, such as SAML 2.0, TACACS+, OAuth, OIDC, and Kerberos. FREE ACCESS
  • Locked
    9.  Access Control Schemes
    7m 31s
    After completing this video, you will be able to describe access control schemes like Attribute-based Access Control, Role-based Access Control, Rule-based Access Control, Mandatory Access Control, and Discretionary Access Control. FREE ACCESS
  • Locked
    10.  Course Summary
    39s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)
Rating 4.2 of 180 users Rating 4.2 of 180 users (180)