Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management

Description

Learn the essentials of identity and access management, from multifactor authentication to privilege management. This course will prepare you for the CySA+ (CS0-002) exam. Identity and access management systems help organizations accomplish several fundamental tasks: identifying users, authenticating them, and ensuring that they can access only the resources and information that they are privy to. In this course—the third installment in the CySA+ (CS0-002) Cert Prep series—instructor Mike Chapple delves into the identity access management portion of domain two of the CompTIA Cybersecurity Analyst (CySA+) (CS0-002) exam: Software and Systems Security. Mike discusses different means of verifying identity, including biometrics; key authentication techniques, systems, and protocols; authorization and privilege management; the identity management lifecycle; and how to address common security issues in the realm of identity management.We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

Tags

Syllabus

Syllabus Introduction Identity and access management What you should know Study resources 1. Identity and Access Management Identity and access management Identification, authentication, and authorization Subject/object model Provisioning and deprovisioning Identity security issues 2. Identification User names and access cards Biometrics Registration and identity proofing 3. Authentication Authentication factors Multi-factor authentication Something you have Password authentication protocols Single sign-on (SSO) and federation RADIUS and TACACS Kerberos and LDAP SAML IDaaS Advanced authorization concepts 4. Authorization Authorization and privilege management Mandatory access controls Discretionary access controls Access control lists (ACL) 5. Identity Management Life Cycle Account and privilege management Account policies Password policies Role management Account monitoring Conclusion Next steps Read more


CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management

Affiliate notice

Learn the essentials of identity and access management, from multifactor authentication to privilege management. This course will prepare you for the CySA+ (CS0-002) exam. Identity and access management systems help organizations accomplish several fundamental tasks: identifying users, authenticating them, and ensuring that they can access only the resources and information that they are privy to. In this course—the third installment in the CySA+ (CS0-002) Cert Prep series—instructor Mike Chapple delves into the identity access management portion of domain two of the CompTIA Cybersecurity Analyst (CySA+) (CS0-002) exam: Software and Systems Security. Mike discusses different means of verifying identity, including biometrics; key authentication techniques, systems, and protocols; authorization and privilege management; the identity management lifecycle; and how to address common security issues in the realm of identity management.We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

Syllabus Introduction Identity and access management What you should know Study resources 1. Identity and Access Management Identity and access management Identification, authentication, and authorization Subject/object model Provisioning and deprovisioning Identity security issues 2. Identification User names and access cards Biometrics Registration and identity proofing 3. Authentication Authentication factors Multi-factor authentication Something you have Password authentication protocols Single sign-on (SSO) and federation RADIUS and TACACS Kerberos and LDAP SAML IDaaS Advanced authorization concepts 4. Authorization Authorization and privilege management Mandatory access controls Discretionary access controls Access control lists (ACL) 5. Identity Management Life Cycle Account and privilege management Account policies Password policies Role management Account monitoring Conclusion Next steps Read more