CompTIA Cloud+: Cloud Identity & Access Management
CompTIA
| Intermediate
- 12 videos | 1h 13m 28s
- Includes Assessment
- Earns a Badge
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how to configure identity and access management (iam) including identification, authorization, and privileged access managementDescribe how to use the lightweight directory access protocol (ldap) to manage access to resourcesDescribe how identity federation can be used to manage user identitiesDescribe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival serversDescribe how multi-factor authentication (mfa) can be used for access control
-
Describe how single sign-on (sso) can be used to reduce the need to sign on to multiple systemsDescribe how public key infrastructure (pki) is used to create, manage, distribute, use, store, and revoke digital certificatesDescribe how secret and key management can be used to centrally manage security keysDescribe the components that can be used to perform incident response preparationDescribe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysisSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 14sThe CompTIA Cloud+ certification is targeted at IT infrastructure specialist audiences who want to develop multi-vendor skills in the areas of cloud computing, including the movement of applications, databases, workflows, and systems to the cloud. This certification addresses system architecture, security, deployment, operations, and automation, and aims to prepare system administrators to perform the tasks required of their job, not just to rely on a narrow set of vendor-specific product features and functions. FREE ACCESS
-
7m 47sIn this video, you'll learn the key terms related to identity management and resource access control. You will learn about authentication and authorization. You'll learn that with a cloud-based software approach, establishing authentication is usually performed by a variety of HTTP-based protocols. This means the identity of a user, device, or a service can be presented to the cloud authentication system to confirm the identity of the entity requesting access. FREE ACCESS
-
9m 16sIn this video, you’ll learn about the implementation of cloud directory services and how the Lightweight Directory Access Protocol, or LDAP, fits into managing a cloud environment. You’ll learn that the LDAP is used to access or manage an existing directory service and build a directory if necessary. You’ll discover a directory service is a database of objects that are managed collectively as a unit. FREE ACCESS
-
6m 49sIn this video, you'll learn about Identity Federation in cloud services, which provides you with another means to manage identities. You’ll learn that the primary components of an Identity Federation are an identity provider and a service provider. You’ll also learn that an identity provider verifies the credentials and if successful, grants an access token and then the user can access the app. FREE ACCESS
-
9m 33sIn this video, you’ll take a look at certificate management and how it relates to various aspects of securing identities and resources. You’ll learn about several components involved with certificate management beginning with Certificate Stores, which include a Trusted Root Certification Authority store, a Trusted publisher store and a local computer store. You’ll learn that these stores refer to a storage location for certificates that are managed by or issued to that particular entity. FREE ACCESS
-
5m 56sIn this video, you’ll learn about Multi-factor Authentication, which is a means to further secure the authentication process by requiring a user to prove their identity, by presenting at least two or more pieces of evidence. You’ll discover that while Multi-factor Authentication might still use your password, it will also require something else, such as a code to your mobile phone via a text message that has to be entered. FREE ACCESS
-
5m 35sIn this video, you’ll learn about the use of Single Sign-on, or SSO, for use with cloud services, which means that once a user has completed a secure authentication by logging in, they are then able to access multiple applications or services using that single set of credentials. You’ll learn this means once a user is logged in, they won’t have to continually provide their credentials each time they want to access a different service. FREE ACCESS
-
6m 26sIn this video, you’ll learn about the use of Public Key Infrastructure or PKI, which represents a collection of hardware, software, policies, and procedures that are combined to produce a digital certificate that can be used to establish a trusted identity for a service principal or the identity of a computer such as a web server. You’ll also learn how to implement encryption using public and private keys to secure communications between devices. FREE ACCESS
-
6m 55sIn this video, you’ll learn about Cloud Key Management methods. You’ll learn how these methods provide better security for the cryptographic keys that represent the algorithms used to secure communications and information. You will also learn how to protect the keys. And you’ll discover that the means by which you implement your Key Management can vary. FREE ACCESS
-
6m 7sIn this video, you’ll learn more about preparing and implementing an Incident Response Plan. You’ll discover this is especially necessary if you are going to create a cloud service that is intended to be consumed by your customers. You’ll learn that an Incident Response Plan can take a variety of forms but must be a documented plan that assumes incidents will happen and details the process of dealing with them. FREE ACCESS
-
6m 1sIn this video, you will learn more about incident response procedures. This video will outline the actual steps that should be taken to fully resolve an issue. You’ll learn that all steps must be documented for future reference and that the documentation should begin right away and continue throughout the process until the issue is resolved. Plus, you’ll learn why this documentation is so important. FREE ACCESS
-
50sIn this video, you will summarize what you’ve learned in the course. This course has covered Cloud Identity and Access Management and incident response preparation and response procedures. You explored configuring identity and access management, the use of the Lightweight Directory Access Protocol, using federation to manage user identities, certificate management concepts, multi-factor authentication, single sign-on, and public key infrastructure, cloud secret and key management, and incident response, preparation and procedures. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.