What is Identification, Authentication, Authorization, Auditing, Accountability| IAAA| Cybersecurity

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

This is really a good explanation. However, I would like to do a small correction. When you explain the IAAA concept, stick into the (Identification, Authentication, Authorization, and Accountability) stages only. Auditing is coming under the Accountability stage.

lgkasundssc
Автор

Hello,

My name is Rajesh Moravaneni, and I currently live in the United States. I recently completed my master's degree. Applying for SOC Analyst and Security Engineer positions. I have two years of experience in security engineering, namely the offensive security side. I'm hoping to develop defensive security knowledge (SOC Analyst). I discovered your YouTube channel and watched a few videos on SOC Analyst. They were excellent and clearly described. I'd like to know where you would provide training, and if so, I'd like to take it from you. I am open to One-on-One sessions. Thank you for your time. Regards, Rajesh Moravaneni.

rajeshmoravaneni
Автор

could you please provide vdo related with the active directory

sumit
Автор

please attach the word file also, that will really help.

ravurinagamanohar