Identity and Access Management IAM
What you’ll learn
Identity and Access Management (IAM)
Privileged Account Management (PAM)
Identity Governance and Administration (IGA)
Data Governance and Protection
Requirements
Basic IT and Cyber Security knowledge (Not essential)
Basic Microsoft Windows knowledge
Description
Identity and Access Management is a fundamental and critical cybersecurity capability, to ensure the right people and things have the right access to the right resources at the right time.In this course, you will learn about different components of Identity and Access Management, security considerations and some labs and examples.
Overview
Lecture 1 Introduction
Section 1: Domain 1 – Identification, Authentication, Authorization & Accounting (IAAA)
Lecture 2 Domain 1 – Introduction and Summary
Lecture 3 CIA Principles
Lecture 4 IAAA operation
Lecture 5 Some Important Security Concepts
Lecture 6 Kerberos
Lecture 7 Identity federation & SSO
Lecture 8 Web Services Federation and OAuth
Lecture 9 Authentication Factors
Lecture 10 Biometrics
Lecture 11 Thank you!
Lecture 12 Optional – Lab 1-1
Lecture 13 Optional – Lab 1-2
Lecture 14 Optional – Lab 1-3
Lecture 15 Optional – Lab 1-4
Lecture 16 Optional – Lab 1-5
Lecture 17 Okta Platform Introduction
Lecture 18 Okta developer free account
Lecture 19 Okta Getting Started – Customized Goals
Lecture 20 Okta User and Group Management and Directory Integration
Lecture 21 Okta Customizations
Lecture 22 Okta Application Integration 1
Lecture 23 Okta Application Integration 2
Lecture 24 Okta Custom Application Integration
Lecture 25 Okta Self Service Portal
Lecture 26 Okta Security Settings
Lecture 27 Okta System Logs and Reporting
Section 2: Domain 2 – Privileged Account Management (PAM)
Lecture 28 Domain 2 Privileged Access Management
Lecture 29 Privileged Accounts
Lecture 30 Privileged Account and Session Management
Lecture 31 Privileged Account Monitoring
Lecture 32 Privileged Account Management Solutions
Lecture 33 Application Whitelisting
Lecture 34 Optional – Lab 2-1
Lecture 35 Optional – Lab 2-2
Lecture 36 Privileged Account (Access) Management (PAM)
Section 3: Domain 3 – Identity Governance and Administration (IGA)
Lecture 37 Domain 3 Identity Governance and Administration (IGA)
Lecture 38 User Onboarding
Lecture 39 User Termination & Role changes
Lecture 40 Access Controls & RBAC
Lecture 41 Access validation & Certification
Lecture 42 Segregation of Duties, Auditing and Reporting
Lecture 43 Identity Lifecycle Management (ILM)
Lecture 44 System for Cross-domain Identity Management
Lecture 45 Optional – Lab 3-1
Lecture 46 Optional – Lab 3-2
Lecture 47 Optional – Lab 3-3
Lecture 48 Identity Governance and Administration – Definition
Lecture 49 One Identity Manager Virtual Lab Design
Lecture 50 One Identity Manager Virtual Lab Environment
Lecture 51 One Identity Manager Virtual Lab – Web Login
Lecture 52 One Identity Manager Virtual Lab – Manager Access
Lecture 53 One Identity Manager Virtual Lab – Self Service Portal
Lecture 54 One Identity Manager Virtual Lab – Service Catalog
Lecture 55 One Identity Manager Virtual Lab – Additional roles
Lecture 56 One Identity Manager Virtual Lab – Business and System Roles
Lecture 57 One Identity Manager Virtual Lab – Role Owners Web Access
Lecture 58 One Identity Manager Virtual Lab – Attestation Policies
Lecture 59 Compliance and Governance Administration
Section 4: Domain 4 – Data Governance and Protection
Lecture 60 Domain 4 – Data Governance and Protection
Lecture 61 Data Types
Lecture 62 Intellectual property
Lecture 63 Data Classification
Lecture 64 Industry and local laws and regulations
Lecture 65 Data Type Management & Monitoring
Lecture 66 Security Policy Framework
Lecture 67 Data Breach and Incident Response Process
Lecture 68 Notifiable Data Breaches
Lecture 69 Optional – Lab 4-1
Lecture 70 Optional – Lab 4-2
Lecture 71 Optional – Lab 4-3
Lecture 72 Optional – Lab 4-4
Lecture 73 Data Security strategy for organizations
IT and Cyber Security Students,Information Security Team members,Information Security Professional,Chief Information Security Manager,IT professionals
Course Information:
Udemy | English | 5h 13m | 1.34 GB
Created by: Rassoul Zadeh
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com