Identity Management, Directory Services, and Federation

Cybersecurity    |    Beginner
  • 27 videos | 1h 19m 50s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 220 users Rating 4.7 of 220 users (220)
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List key fundamentals of identity management including privilege administration, access control, and system scalability
    Provide an overview of identification, authentication, authorization, accountability (iaaa) services
    Describe how personally identifiable information (pii) can be used to identify a subject and list items at risk including social security numbers, birthdates, passwords, and email addresses
    List the three main types of authentication factors
    Provide examples of the authentication factor 'something you know'
    Provide examples of the authentication factor 'something you have'
    Provide examples of the authentication factor 'something you are'
    Describe how to use the zephyr analysis chart to determine which biometric to use
    Recognize how to use a crossover error rate (cer) analysis to determine biometric device accuracy
    Discuss considerations for single factor and multi-factor authentication
    Describe how directory services can be used to organize network resources
    Describe how kerberos works and recognize how it can be used in an identity management solution
    Provide an overview of the windows nt lan manager security protocol suite
  • Discuss how password policies can be used to define how secrets are to be managed
    Describe how dictionary attacks can be used to compromise passwords
    Provide an overview of how brute force attacks can be used to compromise passwords
    Provide an overview of the rainbow table password cracking technique
    List common password assessment tools including cain and abel, hashcat, and pwdump
    Crack a password using the cain tool
    Recognize key functions of password/credential managers
    Provide an overview of the same sign-on authentication scheme
    Recognize key features of a single sign-on authentication scheme
    Provide an overview of service accounts and describe how they can be used to run different roles or services within an organization
    Describe how federation can be used to link together different authentication systems
    List use cases for federated single sign-on solutions
    Provide an overview of identity as a server (idaas) and discuss how it can provide organizations with authentication and access controls

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.4 of 66 users Rating 4.4 of 66 users (66)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 93 users Rating 4.6 of 93 users (93)
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Rating 4.7 of 45 users Rating 4.7 of 45 users (45)