CompTIA Cloud+: Authentication and Authorization in the Cloud

CompTIA Cloud+    |    Intermediate
  • 13 videos | 1h 6m 17s
  • Earns a Badge
Cloud resources such as services, applications, and data require various controls to protect them from unauthorized access. Network administrators need to be able to understand the principles of authentication and authorization in order to properly secure an organization's resources. In this course, you'll learn about authentication and authorization in the cloud, beginning with cloud authentication models, user authentication, federated authentication, and Security Assertion Markup Language (SAML). Then you'll explore token-based access, directory-based access, multi-factor authentication (MFA), and OpenID Connect (OIDC). Finally, you'll delve into OAuth 2.0 access, discretionary access, and audit trails. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of various models for enforcing authentication in the cloud
    Outline the characteristics of local user authentication methods and considerations
    Identify key aspects of federated authentication
    Outline security assertion markup language (saml) and its role in authentication and authorization
    Identify the characteristics of token-based access and how it's used to secure access in the cloud
    Identify the characteristics of directory-based access and how it's used to secure access in the cloud
  • Outline multi-factor authentication (mfa) access and how it's used to secure access in the cloud
    Outline openid connect (oidc) and how it's used to secure access in the cloud
    Discuss oauth 2.0 and how it's used to secure access in the cloud
    Provide an overview of discretionary access and how it's used to secure access in the cloud
    Identify the characteristics of audit trails and their uses in managing secure access in the cloud
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 8s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 28s
    After completing this video, you will be able to provide an overview of various models for enforcing authentication in the cloud. FREE ACCESS
  • Locked
    3.  User Authentication
    6m 16s
    In this video, we will outline the characteristics of local user authentication methods and considerations. FREE ACCESS
  • Locked
    4.  Federated Authentication
    6m 28s
    In this video, you will learn how to identify key aspects of federated authentication. FREE ACCESS
  • Locked
    5.  Security Assertion Markup Language (SAML)
    5m 15s
    Upon completion of this video, you will be able to outline Security Assertion Markup Language (SAML) and its role in authentication and authorization. FREE ACCESS
  • Locked
    6.  Token-Based Access
    5m 3s
    After completing this video, you will be able to identify the characteristics of token-based access and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    7.  Directory-Based Access
    7m 18s
    Upon completion of this video, you will be able to identify the characteristics of directory-based access and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    8.  Multi-Factor Authentication (MFA)
    6m 42s
    After completing this video, you will be able to outline multi-factor authentication (MFA) access and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    9.  OpenID Connect (OIDC)
    4m 33s
    Upon completion of this video, you will be able to outline OpenID Connect (OIDC) and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    10.  OAuth 2.0 Access
    5m 8s
    In this video, we will discuss OAuth 2.0 and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    11.  Discretionary Access
    5m 55s
    Upon completion of this video, you will be able to provide an overview of discretionary access and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    12.  Audit Trails
    5m 12s
    After completing this video, you will be able to identify the characteristics of audit trails and their uses in managing secure access in the cloud. FREE ACCESS
  • Locked
    13.  Course Summary
    51s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 100 users Rating 4.6 of 100 users (100)
Rating 4.4 of 14 users Rating 4.4 of 14 users (14)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)