YoVDO

CISSP Cert Prep: 5 Identity and Access Management

Offered By: LinkedIn Learning

Tags

CISSP Certification Courses Cybersecurity Courses Authorization Courses Multi-Factor Authentication Courses Access Control Lists Courses Identity and Access Management Courses

Course Description

Overview

Study for CISSP certification while you learn industry best practices for identity and access management (IAM).

Prepare for the CISSP exam while you learn industry best practices for identity and access management (IAM). IAM is covered in the fifth domain of the exam, and comprises 13% of the test questions for the highly prized IT security certification. This course includes coverage of the core components of IAM: identification, authentication, authorization, and accountability. Learn how to control both the physical and logical access to your hardware, information systems, and data. Instructor Mike Chapple, the author of our nine-part CISSP test prep series, also covers credential management, external identity management, and prevention and mitigation of access control attacks. Members who take all eight courses in the series will be prepared to take the CISSP exam.

You can sign up for Mike's free study group at certmike.com, and find his study guides at the Sybex test prep site. To review the complete CISSP Body of Knowledge, visit https://www.isc2.org/cissp-domains/default.aspx.


Syllabus

Introduction

  • Manage users
  • What you need to know

1. Identity and Access Management

  • Identity and access management
  • Identification, authentication, and authorization

2. Identification

  • Usernames and access cards
  • Biometrics
  • Registration and identity proofing

3. Authentication

  • Authentication factors
  • Multi-factor authentication
  • Something you have
  • Password authentication protocols
  • SSO and federation
  • RADIUS and TACACS
  • Kerberos and LDAP
  • SAML
  • Identity as a service (IDaaS)
  • OAuth and OpenID Connect
  • Certificate-based authentication

4. Accountability

  • Understanding accountability
  • Session management

5. Credential Management

  • Understanding account and privilege management
  • Account policies
  • Password policies
  • Manage roles
  • Account monitoring
  • Provisioning and deprovisioning

6. Authorization

  • Understanding authorization
  • Mandatory access controls
  • Discretionary access controls
  • Access control lists
  • Database access control
  • Advanced authorization concepts

7. Access Control Attacks

  • Defend against password attacks
  • Watering hole attacks
  • Social engineering attacks
  • Impersonation attacks

Conclusion

  • Next steps

Taught by

Mike Chapple

Related Courses

CISSP (Certified Information Systems Security Professional) Course
Cybrary
CNIT 125: Information Security Professional (CISSP Preparation)
CNIT - City College of San Francisco via Independent
CISSP Cert Prep (2021): 1 Security and Risk Management
LinkedIn Learning
CISSP Cert Prep (2021): 3 Security Architecture and Engineering
LinkedIn Learning
CISSP Cert Prep (2021): 4 Communication and Network Security
LinkedIn Learning