Earning the CompTIA Cybersecurity Analyst (CySA+) certification indicates that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course—the fifth installment in the CySA+ Cert Prep series—review key identity and access management concepts that can prepare you for the second part of domain four, Security Architecture and Tool Sets. Instructor Mike Chapple dives into the three major steps of the access management process—identification, authentication, and authorization; discusses different means of identification; and goes over discretionary and mandatory access controls. He also covers access control exploits, discussing watering hole attacks, impersonation attacks, session hijacking, and more.
Topics include:
- Provisioning and deprovisioning
- Identity security issues
- Using biometric measures as identification mechanisms
- Multifactor authentication
- Password authentication protocols
- How LDAP and Kerberos work together
- Identity as a Service (IDaaS)
- Mandatory and discretionary access controls
- Defending against password attacks
- Social engineering attacks
Table of Contents
Introduction
1 Welcome
2 Need to know
1 Welcome
2 Need to know
Identity and Access Management
3 Identity and access management
4 Identification authentication and authorization
5 Subject and object model
6 Provisioning and deprovisioning
7 Identity security issues
3 Identity and access management
4 Identification authentication and authorization
5 Subject and object model
6 Provisioning and deprovisioning
7 Identity security issues
Identification
8 Usernames and access cards
9 Biometrics
10 Registration and identity proofing
8 Usernames and access cards
9 Biometrics
10 Registration and identity proofing
Authentication
11 Authentication factors
12 Multifactor authentication
13 Something you have
14 Password authentication protocols
15 SSO and federation
16 RADIUS and TACACS
17 Kerberos and LDAP
18 SAML
19 Identity as a Service IDaaS
11 Authentication factors
12 Multifactor authentication
13 Something you have
14 Password authentication protocols
15 SSO and federation
16 RADIUS and TACACS
17 Kerberos and LDAP
18 SAML
19 Identity as a Service IDaaS
Authorization
20 Understand authorization
21 Mandatory access controls
22 Discretionary access controls
23 Access control lists
24 Advanced authorization concepts
20 Understand authorization
21 Mandatory access controls
22 Discretionary access controls
23 Access control lists
24 Advanced authorization concepts
Access Control Exploits
25 Defend against password attacks
26 Watering hole attacks
27 Social engineering attacks
28 Impersonation attacks
29 Session hijacking
30 Eavesdropping attacks
31 Privilege escalation and rootkits
25 Defend against password attacks
26 Watering hole attacks
27 Social engineering attacks
28 Impersonation attacks
29 Session hijacking
30 Eavesdropping attacks
31 Privilege escalation and rootkits
Conclusion
32 Next steps
32 Next steps
CySA+ Cert Prep: 5 Identity and Access Management
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 50m | 300 MB
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 50m | 300 MB
Download from Turbobit
Download from DepositFiles
Download from Rapidgator
No comments: