Identity Management, Directory Services, and Federation
Cybersecurity
| Beginner
- 27 videos | 1h 19m 50s
- Includes Assessment
- Earns a Badge
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList key fundamentals of identity management including privilege administration, access control, and system scalabilityProvide an overview of identification, authentication, authorization, accountability (iaaa) servicesDescribe how personally identifiable information (pii) can be used to identify a subject and list items at risk including social security numbers, birthdates, passwords, and email addressesList the three main types of authentication factorsProvide examples of the authentication factor 'something you know'Provide examples of the authentication factor 'something you have'Provide examples of the authentication factor 'something you are'Describe how to use the zephyr analysis chart to determine which biometric to useRecognize how to use a crossover error rate (cer) analysis to determine biometric device accuracyDiscuss considerations for single factor and multi-factor authenticationDescribe how directory services can be used to organize network resourcesDescribe how kerberos works and recognize how it can be used in an identity management solutionProvide an overview of the windows nt lan manager security protocol suite
-
Discuss how password policies can be used to define how secrets are to be managedDescribe how dictionary attacks can be used to compromise passwordsProvide an overview of how brute force attacks can be used to compromise passwordsProvide an overview of the rainbow table password cracking techniqueList common password assessment tools including cain and abel, hashcat, and pwdumpCrack a password using the cain toolRecognize key functions of password/credential managersProvide an overview of the same sign-on authentication schemeRecognize key features of a single sign-on authentication schemeProvide an overview of service accounts and describe how they can be used to run different roles or services within an organizationDescribe how federation can be used to link together different authentication systemsList use cases for federated single sign-on solutionsProvide an overview of identity as a server (idaas) and discuss how it can provide organizations with authentication and access controls
IN THIS COURSE
-
38s
-
1m 2s
-
3m 18s
-
2m 49s
-
43s
-
2m 26s
-
3m 47s
-
2m 4s
-
2m 16s
-
2m 32s
-
1m
-
2m 24s
-
4m 33s
-
2m 38s
-
6m 5s
-
3m 19s
-
5m 15s
-
5m 34s
-
3m 42s
-
6m 12s
-
4m 56s
-
2m 49s
-
2m 21s
-
2m 18s
-
2m 43s
-
1m 7s
-
1m 21s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.