CISSP 2024: Controlling Asset Access, Device Identification, and Authentication
CISSP 2024
| Expert
- 13 videos | 45m 59s
- Includes Assessment
- Earns a Badge
Traditionally, access control has been described as AAA services. Authentication, authorization, and accounting (AAA) is a security framework that controls access to computer resources, enforces policies, and audits usage. This course explores classic and evolving approaches to controlling asset access and device identification and authentication. Topics include physical and logical access, groups and roles, AAA services, session management, registration, proofing, identity, federated identity management (FIM), credential management systems, single sign-on (SSO), Just-In-Time (JIT), authentication systems, and federated identity. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how to control physical and logical access to assets such as information systems, devices, facilities, applications, and servicesExamine user groups, users, and roles using the aws iam serviceDifferentiate between authentication, authorization, and accounting, including multi-factor authentication (mfa) and passwordless authenticationDefine session managementDifferentiate between identity registration, identity proofing, and establishment of identityDescribe federated identity management (fim)
-
Explain credential management systems and password vaultsDescribe single sign-on (sso)Explain the use of just-in-time provisioningRecognize authentication systems such as radius, tacacs+, and kerberosDescribe federated identity with a third-party service such as on-premise, cloud, and hybridSummarize the key concepts covered in this course
IN THIS COURSE
-
48sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
3m 34sAfter completing this video, you will be able to describe how to control physical and logical access to assets such as information systems, devices, facilities, applications, and services. FREE ACCESS
-
5m 4sIn this video, we will examine user groups, users, and roles using the AWS IAM service. FREE ACCESS
-
5m 23sDuring this video, you will learn how to differentiate between authentication, authorization, and accounting, including multi-factor authentication (MFA) and passwordless authentication. FREE ACCESS
-
4m 22sIn this video, you will learn how to define session management. FREE ACCESS
-
3m 35sIn this video, learn how to differentiate between identity registration, identity proofing, and establishment of identity. FREE ACCESS
-
4m 1sUpon completion of this video, you will be able to describe Federated Identity Management (FIM). FREE ACCESS
-
2m 13sUpon completion of this video, you will be able to explain credential management systems and password vaults. FREE ACCESS
-
2m 59sAfter completing this video, you will be able to describe single sign-on (SSO). FREE ACCESS
-
1m 58sIn this video, we will explain the use of just-in-time provisioning. FREE ACCESS
-
9m 17sFind out how to recognize authentication systems such as RADIUS, TACACS+, and Kerberos. FREE ACCESS
-
2m 2sUpon completion of this video, you will be able to describe federated identity with a third-party service such as on-premise, cloud, and hybrid. FREE ACCESS
-
44sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.