Identity Management, Directory Services, and Federation

Cybersecurity    |    Beginner
  • 27 Videos | 1h 22m 20s
  • Includes Assessment
  • Earns a Badge
Likes 2 Likes 2
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    list key fundamentals of identity management including privilege administration, access control, and system scalability
    provide an overview of identification, authentication, authorization, accountability (IAAA) services
    describe how personally identifiable information (PII) can be used to identify a subject and list items at risk including social security numbers, birthdates, passwords, and email addresses
    list the three main types of authentication factors
    provide examples of the authentication factor 'something you know'
    provide examples of the authentication factor 'something you have'
    provide examples of the authentication factor 'something you are'
    describe how to use the Zephyr analysis chart to determine which biometric to use
    recognize how to use a crossover error rate (CER) analysis to determine biometric device accuracy
    discuss considerations for single factor and multi-factor authentication
    describe how directory services can be used to organize network resources
    describe how Kerberos works and recognize how it can be used in an identity management solution
    provide an overview of the Windows NT LAN Manager security protocol suite
  • discuss how password policies can be used to define how secrets are to be managed
    describe how dictionary attacks can be used to compromise passwords
    provide an overview of how brute force attacks can be used to compromise passwords
    provide an overview of the rainbow table password cracking technique
    list common password assessment tools including Cain and Abel, Hashcat, and Pwdump
    crack a password using the Cain tool
    recognize key functions of password/credential managers
    provide an overview of the same sign-on authentication scheme
    recognize key features of a single sign-on authentication scheme
    provide an overview of service accounts and describe how they can be used to run different roles or services within an organization
    describe how federation can be used to link together different authentication systems
    list use cases for federated single sign-on solutions
    provide an overview of identity as a Server (IDaaS) and discuss how it can provide organizations with authentication and access controls

IN THIS COURSE

  • Playable
    1. 
    Identity Management and Directory Services
    38s
    UP NEXT
  • Playable
    2. 
    Fundamentals of Identity Management?
    1m 2s
  • Locked
    3. 
    Overview of IAAA Services
    3m 18s
  • Locked
    4. 
    Personally Identifiable Information
    2m 49s
  • Locked
    5. 
    Authentication Factors
    43s
  • Locked
    6. 
    Something You Know
    2m 26s
  • Locked
    7. 
    Something You Have
    3m 47s
  • Locked
    8. 
    Something You Are
    2m 4s
  • Locked
    9. 
    Zephyr Analysis Chart
    2m 16s
  • Locked
    10. 
    Crossover Error Rate Analysis
    2m 32s
  • Locked
    11. 
    Authentication Factor Considerations
    1m
  • Locked
    12. 
    Directory Services
    2m 24s
  • Locked
    13. 
    Kerberos Authentication
    4m 33s
  • Locked
    14. 
    Windows NT LAN Manager
    2m 38s