CompTIA Security+: Identity and Access Management

CompTIA Security+    |    Beginner
  • 9 videos | 42m 18s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Hybrid and remote work are more common than ever, and employees need secure access to enterprise resources from wherever they are. This is where identity and access management (IAM) comes to the rescue. The organization's IT department needs to control what users can and can't access so that sensitive data and functions are restricted to only the people and resources that need to work with them. In this course, we will explore IAM tools beginning with provisioning and deprovisioning user accounts, and password concepts including password best practices, length, complexity, reuse, expiration, age, password managers, and passwordless solutions. Next, we will look at federation and single sign-on (SSO), Lightweight Directory Access Protocol (LDAP), Open Authorization (OAuth), Security Assertions Markup Language (SAML), interoperability, and attestation. We will then consider access control models including mandatory, discretionary, role-based, rule-based, attribute-based, time-of-day restrictions, and least privilege. Finally, we will explore multi-factor authentication (MFA), biometric authentication, and privileged access management tools (PAM). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provision and deprovision user accounts including permission assignments and implications, and identity proofing
    Explain password concepts like best practices, length, complexity, reuse, expiration, age, password managers, and passwordless solutions
    Define federation and single sign-on solutions such as lightweight directory access protocol (ldap), open authorization (oauth), security assertion markup language (saml), interoperability, and attestation
    Compare access control models including mandatory, discretionary, role-based, rule-based, attribute-based, time-of-day, and least privilege
  • Compare multi-factor authentication (mfa) categories
    Outline the use of biometric authentication modalities
    Define privileged access management (pam) and tools like just-in-time permissions, password vaulting, and ephemeral credentials
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 33s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 6s
    In this video, find out how to provision and deprovision user accounts including permission assignments and implications, and identity proofing. FREE ACCESS
  • Locked
    3.  Exploring Password Concepts
    3m 12s
    In this video, we will explain password concepts like best practices, length, complexity, reuse, expiration, age, password managers, and passwordless solutions. FREE ACCESS
  • Locked
    4.  Federation and Single Sign-on (SSO)
    9m 45s
    Upon completion of this video, you will be able to define federation and single sign-on solutions such as Lightweight Directory Access Protocol (LDAP), Open Authorization (OAuth), Security Assertion Markup Language (SAML), interoperability, and attestation. FREE ACCESS
  • Locked
    5.  Access Control Models
    8m 33s
    After completing this video, you will be able to compare access control models including mandatory, discretionary, role-based, rule-based, attribute-based, time-of-day, and least privilege. FREE ACCESS
  • Locked
    6.  Multi-factor Authentication (MFA)
    2m 20s
    Upon completion of this video, you will be able to compare multi-factor authentication (MFA) categories. FREE ACCESS
  • Locked
    7.  Biometric Authentication
    5m 28s
    After completing this video, you will be able to outline the use of biometric authentication modalities. FREE ACCESS
  • Locked
    8.  Privileged Access Management Tools
    3m 43s
    Upon completion of this video, you will be able to define privileged access management (PAM) and tools like just-in-time permissions, password vaulting, and ephemeral credentials. FREE ACCESS
  • Locked
    9.  Course Summary
    37s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 4 users Rating 4.5 of 4 users (4)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 2143 users Rating 4.6 of 2143 users (2143)