Identity and Access Management IAM

Managing identities and their access level is the most important part of cyber security frameworks
Identity and Access Management IAM
File Size :
1.34 GB
Total length :
5h 13m

Category

Instructor

Rassoul Zadeh

Language

Last update

8/2022

Ratings

4.4/5

Identity and Access Management IAM

What you’ll learn

Identity and Access Management (IAM)
Privileged Account Management (PAM)
Identity Governance and Administration (IGA)
Data Governance and Protection

Identity and Access Management IAM

Requirements

Basic IT and Cyber Security knowledge (Not essential)
Basic Microsoft Windows knowledge

Description

Identity and Access Management is a fundamental and critical cybersecurity capability, to ensure the right people and things have the right access to the right resources at the right time.In this course, you will learn about different components of Identity and Access Management, security considerations and some labs and examples.

Overview

Lecture 1 Introduction

Section 1: Domain 1 – Identification, Authentication, Authorization & Accounting (IAAA)

Lecture 2 Domain 1 – Introduction and Summary

Lecture 3 CIA Principles

Lecture 4 IAAA operation

Lecture 5 Some Important Security Concepts

Lecture 6 Kerberos

Lecture 7 Identity federation & SSO

Lecture 8 Web Services Federation and OAuth

Lecture 9 Authentication Factors

Lecture 10 Biometrics

Lecture 11 Thank you!

Lecture 12 Optional – Lab 1-1

Lecture 13 Optional – Lab 1-2

Lecture 14 Optional – Lab 1-3

Lecture 15 Optional – Lab 1-4

Lecture 16 Optional – Lab 1-5

Lecture 17 Okta Platform Introduction

Lecture 18 Okta developer free account

Lecture 19 Okta Getting Started – Customized Goals

Lecture 20 Okta User and Group Management and Directory Integration

Lecture 21 Okta Customizations

Lecture 22 Okta Application Integration 1

Lecture 23 Okta Application Integration 2

Lecture 24 Okta Custom Application Integration

Lecture 25 Okta Self Service Portal

Lecture 26 Okta Security Settings

Lecture 27 Okta System Logs and Reporting

Section 2: Domain 2 – Privileged Account Management (PAM)

Lecture 28 Domain 2 Privileged Access Management

Lecture 29 Privileged Accounts

Lecture 30 Privileged Account and Session Management

Lecture 31 Privileged Account Monitoring

Lecture 32 Privileged Account Management Solutions

Lecture 33 Application Whitelisting

Lecture 34 Optional – Lab 2-1

Lecture 35 Optional – Lab 2-2

Lecture 36 Privileged Account (Access) Management (PAM)

Section 3: Domain 3 – Identity Governance and Administration (IGA)

Lecture 37 Domain 3 Identity Governance and Administration (IGA)

Lecture 38 User Onboarding

Lecture 39 User Termination & Role changes

Lecture 40 Access Controls & RBAC

Lecture 41 Access validation & Certification

Lecture 42 Segregation of Duties, Auditing and Reporting

Lecture 43 Identity Lifecycle Management (ILM)

Lecture 44 System for Cross-domain Identity Management

Lecture 45 Optional – Lab 3-1

Lecture 46 Optional – Lab 3-2

Lecture 47 Optional – Lab 3-3

Lecture 48 Identity Governance and Administration – Definition

Lecture 49 One Identity Manager Virtual Lab Design

Lecture 50 One Identity Manager Virtual Lab Environment

Lecture 51 One Identity Manager Virtual Lab – Web Login

Lecture 52 One Identity Manager Virtual Lab – Manager Access

Lecture 53 One Identity Manager Virtual Lab – Self Service Portal

Lecture 54 One Identity Manager Virtual Lab – Service Catalog

Lecture 55 One Identity Manager Virtual Lab – Additional roles

Lecture 56 One Identity Manager Virtual Lab – Business and System Roles

Lecture 57 One Identity Manager Virtual Lab – Role Owners Web Access

Lecture 58 One Identity Manager Virtual Lab – Attestation Policies

Lecture 59 Compliance and Governance Administration

Section 4: Domain 4 – Data Governance and Protection

Lecture 60 Domain 4 – Data Governance and Protection

Lecture 61 Data Types

Lecture 62 Intellectual property

Lecture 63 Data Classification

Lecture 64 Industry and local laws and regulations

Lecture 65 Data Type Management & Monitoring

Lecture 66 Security Policy Framework

Lecture 67 Data Breach and Incident Response Process

Lecture 68 Notifiable Data Breaches

Lecture 69 Optional – Lab 4-1

Lecture 70 Optional – Lab 4-2

Lecture 71 Optional – Lab 4-3

Lecture 72 Optional – Lab 4-4

Lecture 73 Data Security strategy for organizations

IT and Cyber Security Students,Information Security Team members,Information Security Professional,Chief Information Security Manager,IT professionals

Course Information:

Udemy | English | 5h 13m | 1.34 GB
Created by: Rassoul Zadeh

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top