CySA+ Cert Prep: 5 Identity and Access Management | ScanLibs

728x90 AdSpace

Trending

CySA+ Cert Prep: 5 Identity and Access Management


Earning the CompTIA Cybersecurity Analyst (CySA+) certification indicates that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course—the fifth installment in the CySA+ Cert Prep series—review key identity and access management concepts that can prepare you for the second part of domain four, Security Architecture and Tool Sets. Instructor Mike Chapple dives into the three major steps of the access management process—identification, authentication, and authorization; discusses different means of identification; and goes over discretionary and mandatory access controls. He also covers access control exploits, discussing watering hole attacks, impersonation attacks, session hijacking, and more.
Topics include:
  • Provisioning and deprovisioning
  • Identity security issues
  • Using biometric measures as identification mechanisms
  • Multifactor authentication
  • Password authentication protocols
  • How LDAP and Kerberos work together
  • Identity as a Service (IDaaS)
  • Mandatory and discretionary access controls
  • Defending against password attacks
  • Social engineering attacks
 Table of Contents

Introduction
1 Welcome
2 Need to know
Identity and Access Management
3 Identity and access management
4 Identification authentication and authorization
5 Subject and object model
6 Provisioning and deprovisioning
7 Identity security issues
Identification
8 Usernames and access cards
9 Biometrics
10 Registration and identity proofing
Authentication
11 Authentication factors
12 Multifactor authentication
13 Something you have
14 Password authentication protocols
15 SSO and federation
16 RADIUS and TACACS
17 Kerberos and LDAP
18 SAML
19 Identity as a Service IDaaS
Authorization
20 Understand authorization
21 Mandatory access controls
22 Discretionary access controls
23 Access control lists
24 Advanced authorization concepts
Access Control Exploits
25 Defend against password attacks
26 Watering hole attacks
27 Social engineering attacks
28 Impersonation attacks
29 Session hijacking
30 Eavesdropping attacks
31 Privilege escalation and rootkits
Conclusion
32 Next steps



CySA+ Cert Prep: 5 Identity and Access Management 
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 50m | 300 MB


Download from Turbobit


Download from DepositFiles


Download from Rapidgator

CySA+ Cert Prep: 5 Identity and Access Management Reviewed by Rom on 6/09/2018 Rating: 5 Earning the CompTIA Cybersecurity Analyst (CySA+) certification indicates that you have a solid understanding of how to tackle cyberse...

No comments: