Identity and Access Management for CompTIA Security+

User account and access management is a foundational concept that is critical to an organization's overall information security health. This course teaches you the different concepts and technologies associated with identity and access management.
Course info
Rating
(28)
Level
Beginner
Updated
Oct 24, 2017
Duration
1h 40m
Table of contents
Course Overview
Comparing and Contrasting Identity and Access Management Concepts
Installing and Configuring Identity and Access Services
Implementing Identity and Access Management Controls
Differentiating Common Account Management Practices
Description
Course info
Rating
(28)
Level
Beginner
Updated
Oct 24, 2017
Duration
1h 40m
Description

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you'll learn the critical foundational concepts that form the building blocks of every company's information security posture. First, you'll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you'll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you'll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you'll have a better understanding of user account and access management, and you'll be able to take this knowledge into the Security+ exam.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
Introduction to Threat Intelligence
Beginner
1h 10m
Oct 8, 2019
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Christopher Rees, and welcome to my course: Identity and Access Management for CompTIA Security+ In addition to being a trainer here at Pluralsight, I'm a former law enforcement officer, who specialized in computer crimes, and I have over 20 years of enterprise IT experience. I've also been training students from all over the world, since 1998. So, In this course we're going to cover the various concepts and technologies associated with identity and access management, ensuring users can securely access the resources they need to do their jobs, and ultimately, generate revenue. So, some of the major topics we will cover in this course include multi-factor authentication concepts. We'll talk about identity access services, like Kerberos, SAML, OpenID. Oauth, and RADIUS. We'll also talk about access control models, including mandatory access controlled, discretionary access controlled, and also rule-based and role-based access controlled. Biometric authentication controls and their associated concerns. We'll also talk about account management best practices, including account types, maintenance, and policy enforcement. So, by the end of this course, you'll know the key concepts and technologies associated with identity and access management. Making sure your users can access the data and the resources they need safely and securely. Before beginning this course, having some exposure to CompTIA's A+, or Network+ is helpful, but not a requirement. And by the end of this course you'll be ready for the CompTIA Security+ Certification Exam, as well as some advanced security courses, such as CompTIA's Advanced Security Practitioner, and also Malware Analysis: The Big Picture. So, I hope you'll join me on this journey to learn identity and access management with the identity and access manager for CompTIA Security+ Course, here at Pluralsight.