System Security Certified Practitioner (SSCP 2018): Identity Management

Intermediate
  • 14 videos | 55m 8s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Learners can explore identity management, also known as IAM (identity and access management), in this 14-video course helping prepare for the Systems Security Certified Practitioner (SSCP) certification exam. You will learn how to configure identities to have strong authentication for users and devices, such as smart phones. Next, examine single-factor authentication, in which one category is used to authenticate, such as a username and a password. You will examine multifactor authentication where there is a username and a password, and having an additional private key. Learners continue by examining how to use an identity federation, and SSO (single sign-on) a centralized trusted set of logon credentials. This course demonstrates the multiple phases of the IAM lifecycle, including account request, how accounts are provisioned, how the user access is enforced and reported, and how it is de-provisioned. You will learn the concepts and terminology, including IDP (identity provider) and RP (resource provider), and how to use MS Active Directory for authentication. Finally, learners will examine Amazon Web Services CLI (command-line interface) authentication.

WHAT YOU WILL LEARN

  • Describe iam
    List iam lifecycle phases including provisioning, de-provisioning, proofing, authorization, entitlement, and maintenance
    Describe examples of iam systems
    Implement iam in an active directory environment
    Implement iam in an aws environment
    Describe how users, devices, and application authentication provides resource access
    Compare single-factor and multi-factor authentication
  • Configure multi-factor authentication for an aws iam user account
    Login to test multi-factor authentication for an aws iam user account
    Configure access and secret keys to allow aws cli access to the aws cloud
    Describe how identity trust relationships work internally and externally
    Determine when sso should be used
    Describe the relevance of iam and authentication

IN THIS COURSE

  • 1m 58s
  • 3m 24s
    After completing this video, you will be able to describe what IAM is. FREE ACCESS
  • Locked
    3.  IAM Lifecycle
    4m 32s
    After completing this video, you will be able to list IAM lifecycle phases including provisioning, de-provisioning, proofing, authorization, entitlement, and maintenance. FREE ACCESS
  • Locked
    4.  IAM Systems
    5m 21s
    Upon completion of this video, you will be able to describe examples of identity and access management systems. FREE ACCESS
  • Locked
    5.  Create a Microsoft Active Directory User and Group
    6m 33s
    During this video, you will learn how to implement IAM in an Active Directory environment. FREE ACCESS
  • Locked
    6.  Create a Cloud-Based IAM User and Group
    5m 46s
    Learn how to implement IAM in an AWS environment. FREE ACCESS
  • Locked
    7.  Authentication Overview
    3m 3s
    After completing this video, you will be able to describe how user, device, and application authentication provides resource access. FREE ACCESS
  • Locked
    8.  Authentication Factors
    3m 37s
    In this video, learn how to compare single-factor and multi-factor authentication. FREE ACCESS
  • Locked
    9.  Enable Multi-Factor Authentication
    3m 34s
    In this video, you will learn how to configure multi-factor authentication for an AWS IAM user account. FREE ACCESS
  • Locked
    10.  Test Multi-Factor Authentication
    2m 42s
    To test multi-factor authentication for an AWS IAM user account, find out how to login. FREE ACCESS
  • Locked
    11.  Enable CLI Authentication to the Cloud
    3m 54s
    In this video, you will learn how to configure access and secret keys to allow AWS CLI access to the AWS cloud. FREE ACCESS
  • Locked
    12.  Identity Federation
    4m 36s
    After completing this video, you will be able to describe how identity trust relationships work, both internally and externally. FREE ACCESS
  • Locked
    13.  Single Sign-on
    2m 25s
    During this video, you will learn how to determine when single sign-on should be used. FREE ACCESS
  • Locked
    14.  Exercise: Implement IAM
    3m 44s
    Upon completion of this video, you will be able to describe the relevance of identity and access management (IAM) and authentication. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 200 users Rating 4.5 of 200 users (200)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.2 of 14 users Rating 4.2 of 14 users (14)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 45 users Rating 4.7 of 45 users (45)
Rating 4.6 of 222 users Rating 4.6 of 222 users (222)
Rating 4.5 of 2806 users Rating 4.5 of 2806 users (2806)