Description
Price: 6.00 USD | Size: 3.21 GB | Duration : 4.25 Hours | 19 Video Lessons
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
Authentication, Authorization, & Identity Engineering
Anyone who uses a computer on a daily basis needs to have an account. For organizations of any size, those accounts need to be properly secured and managed using a well-designed identity management program. This course will go into detail about various authentication types and authorization mechanisms that are used to grant needed access to an organization’s resources. In addition, we’ll look at how to securely set up and identity management system – from creation of accounts, to integrating with other systems, all the way through logging and monitoring. We’ll also go over the identity and access management lifecycle, and how it plays a critical part in securing the authentication and authorization systems for any organization.
1. Introduction
1. Course Introduction
2. Overview
2. Authentication, Authorization, & Accounting
3. Authentication Types
4. Authorization Mechanisms
3. Active Directory
5. Active Directory Overview
6. RBAC in AD
7. Active Directory Federation
4. Linux
8. Native Linux Authentication
9. Integrating Linux with AD
5. Expanding Identity Management
10. Single Sign On
11. Multifactor Authentication
12. Just in Time Access
6. Logging
13. Authentication & Authorization Logging
14. Active Directory Monitoring
15. Active Directory Logging Demo
16. Linux Monitoring
7. IAM Lifecycle
17. IAM Lifecycle
18. Phases of IAM Lifecycle
8. Conclusion
19. Course Conclusion
Reviews
There are no reviews yet.