CISSP 2021: Deploying Identity & Access Management (IAM)

CISSP    |    Expert
  • 12 videos | 44m 13s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 41 users Rating 4.4 of 41 users (41)
If implemented properly, Identity Access Management mechanisms and protocols can greatly improve an enterprise's visibility and security. This course will help you delve deeper into the practical implementation of identity and access management controls and mechanisms. Explore the implementation of authentication systems like SAML, investigate the management of the identity and access provisioning lifecycle, and discover how the identification of people, devices, and services are managed. You'll also examine authentication and authorization protocols, provisioning and deprovisioning, and accounting, registration, and proofing of identity. After finishing this course, you'll have an understanding of how to effectively use and execute identity and access mechanisms within your organization. Moreover, you can also use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the radius and tacacs+ aaa protocol operations
    Define security assertion markup language (saml) 2.0 and its practical implementation
    Compare openid connect (oidc) and open authorization (oauth) and how they can function together and standalone in modern environments
    Describe the mit kerberos protocol and operation specifically in an active directory (ad) enterprise
    Discuss provisioning and deprovisioning entities as in on/off-boarding and transfer operations
  • Examine the definition and assignment of roles and the management of people assigned to new roles
    Review user, system, and service account access in an enterprise
    Manage elevation (or escalation) of privileges of managed service accounts, use of sudo, and minimizing privilege creep
    Implement identity management (idm) and multi-factor authentication (mfa) processes
    Manage mechanisms like accounting, session management, registration, proofing, fim, credential management, sso, and jit
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 8 users Rating 4.4 of 8 users (8)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.4 of 30 users Rating 4.4 of 30 users (30)
Rating 4.5 of 7114 users Rating 4.5 of 7114 users (7114)