YoVDO

The Issues of Identity and Access Management (IAM)

Offered By: Pluralsight

Tags

Identity and Access Management (IAM) Courses Network Security Courses Single-Sign-On Courses Identity and Access Management Courses

Course Description

Overview

By using established secure network architecture patterns in the design, and then following best practices to configure each component that you plug in to the overall systems, you reduce your overall vulnerabilities significantly. This course will teach you’ll analyze issues with these mechanisms and select available solutions.

IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. In this course, The Issues of Identity and Access Management (IAM), you'll learn to look at IAM from the perspective of the issues that it can create for your organization. First, you'll dive into Oauth/OpenID and where the weaknesses are. Next, you'll explore SSO and federations. Finally, you'll learn how to setup a hacking environment using the AutoLab. When you're finished with this course, you'll be able to look at your IAM solution and see if you're protecting yourself, as well as your users.

Taught by

Dale Meredith

Related Courses

Computing, Storage and Security with Google Cloud Platform
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure en Español
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure en Français
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure 日本語版
Google Cloud via Coursera