CompTIA Security+ (SY0-401) Access Control and Identity Management

This course covers domain 05 of the CompTIA Security+ SY0-401 certification exam. This course deals with controlling user access and identity management tools and techniques.
Course info
Rating
(93)
Level
Beginner
Updated
Jul 11, 2015
Duration
1h 21m
Table of contents
Description
Course info
Rating
(93)
Level
Beginner
Updated
Jul 11, 2015
Duration
1h 21m
Description

Access control and identity management is crucial to maintaining and secure environment. Various hardware controls like RADIUS, TACACS+ and XTACACS are covered, along with directory services and authentication services like Kerberos, LDAP, SAML, and Secure LDAP. The differences between identification, authentication, and authorization are covered, along with the various tools used to ensure users are connected securely with access to resources they need. Technologies and concepts including tokens, multi-authentication, TOTP, HOTP, CHAP, and PAP are covered, along with authentication factors.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Authentication, Authorization, and Access Control
Hey. Welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this module we're going to cover Authentication, Authorization, and Access Controls. Now this is a big module with a lot of information, a lot of important things that you need to understand conceptually, so that you can answer questions properly and kind of understand how everything fits together. In this module we're going to cover a number of things, six main areas, and it's going to be identification, authentication, authentication factors, authorization, federation, and then lastly, transitive trust and authentication, so how those things kind of tie into each other. All of these areas have obviously discreet components, we're going to cover each of these in more detail, then at a high level these are the main six areas that we're going to cover, so let's go ahead and get started.

Account Management Security Controls
Hey. Welcome back to Pluralsight. I'm you're instructor, Christopher Rees, and in this module we're going to cover Account Management and Security Controls. In this module we're going to cover six main areas and that is users with multiple accounts or multiple roles and/or shared accounts, something that we really want to avoid whenever possible. We'll talk about account policy enforcement, we'll talk about group based privileges, why that's better than managing individual users. We'll talk about user assigned privileges and again, why group based privileges is better, easier to manage. We'll talk about user access reviews and then continuous monitoring, why it's important from a security perspective. Let's go ahead and get started.