Identity And Access Management | CISSP Training Videos

preview_player
Показать описание

Domain 5 of the CISSP certification course offered by Simplilearn provides an introduction to Identity and Access Management.

#cissptrainingvideos2017 #cissp #cissptraining #cisspcertification #cissptrainingvideos #cissptutorial

➡️ About Post Graduate Program In Cyber Security
This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing data, including risk analysis, mitigation, and compliance. You will get foundational to advanced skills through industry-leading cyber security certification courses that are part of the program.

✅ Key Features
- Simplilearn Post Graduate Certificate
- Masterclasses from MIT Faculty
- Featuring Modules from MIT SCC and EC-Council
- 8X higher interaction in live online classes conducted by industry experts
- Simplilearn's JobAssist helps you get noticed by top hiring companies
- Industry case studies in cyber security
- Access to CEH Pro Version
- 25+ hands-on projects
- Capstone project in 3 domains
- MIT CSAIL Professional Programs Community

✅ Skills Covered
- Advanced Hacking Concepts
- Network Packet Analysis
- Ethical Hacking
- IDS Firewalls and Honeypots
- Security and Risk Management
- Network Security
- Software Development Security
- Cryptography OSI and TCPIP Models
- Identity and Access Management
- Security Assessment and Testing
- Trojans Backdoors and Countermeasures
- Mobile and Web Technologies

Рекомендации по теме
Комментарии
Автор

0:06 Introduction to access
0:11 Objectives
0:37 Scenario
1:37 Concept of physical and logical access
3:04 Benefits
4:49 Access, Subjects, Objects and access control
6:01
6:46
8:14
8:42 Identity and Access Provisioning Lifecycle***
8:45 Identity and mgmt - Provisioning, Review, Revocation
10:05 Identification, Authentication and Authorization
10:54 Identification Guidelines
11:49 Verifying Identification Information
13:29 Strong Authentication
14:50 Biometrics
20:47 Password
23:40 Token
25:39 Memory and smart card
29:25 Access Criteria
29:47 Access Criteria Cycle
31:27 Authorization Concepts
33:48 Identity Management Implementation
34:07
36:16 Directory Management
38:56 Accounts Management
40:10 Profile Management
40:58 Web Access
41:26 Single Sign On (SSO)
43:19 SSO Technologies
44:13 Kerberos
49:25 Business Scenario 1
53:19 Business Scenario 2
53:43 Access Control Models
56:30 Business Scenario 3
1:02:25 Radius
1:04:11 TACACS
1:05:09 Diameter
1:06:05 Accountability
1:07:46 Access control monitoring
1:08:25 Session management
1:09:21 Registration and proof of identity
1:10:00 Credential Management
1:10:49

mty
Автор

It's nice that this video is edited to eliminate voids, but some of the transitions overlap and make it hard to understand.

trqPwVeUMBcSCGDnvm
Автор

can you show some live examples or tools which iam admin uses?

namrata
Автор

Thanks for the video!
covered the entire module briefly.

TejaReddy
visit shbcf.ru