IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. In this course, The Issues of Identity and Access Management (IAM), you'll learn to look at IAM from the perspective of the issues that it can create for your organization. First, you'll dive into Oauth/OpenID and where the weaknesses are. Next, you'll explore SSO and federations. Finally, you'll learn how to setup a hacking environment using the AutoLab. When you're finished with this course, you'll be able to look at your IAM solution and see if you're protecting yourself, as well as your users.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview [Autogenerated] Hi, everyone. My name is Dale MEREDITH, and I'd like to welcome you to my course. The issues of identity and access management now have been a Microsoft trainer since 1998 and back A wage, A swell as a cyber security trainer since about 2004. I'm also currently a consultant for several different government agencies for cybersecurity. Now, this course is actually part of a Siri's that supports several different certifications, including G. C. H and the new C s A plus. Now, let me ask you a question. How many user accounts and passwords do you have in your life? Anyone? Anyone? Bueller Bueller. The average is about 118 accounts. He believed that actually did an inventory of mine. And I have almost 150 in this course. We're gonna talk about the differences between some of the solutions that are being used as well as the weaknesses that they might actually cause Now I'm not gonna leave union. I never dio I'll tell you some of the cool ways that we can strengthen the use of some of these solutions such as, you know, not writing down a password on a post it note. Now, some of the topics that will cover will include things like Oh, off an open I D and where the weaknesses in their technologies lies. We'll also look at things like sso as well as federations, and I'll even go through and show you how to set up a hacking environment that is not only quick but easy to deploy using our auto labs so that you could test some of these weaknesses. By the end of this course, you'll be able to look at your I'm solution and see if you're protecting yourself as well as your users. You'll also be a couple of steps closer in taking exams with the knowledge that you get from within this course, you know those CS eight plus the G C H E C H. Now, before beginning this course, you should have a somewhat basic knowledge of network technologies, including things like routers and switches and maybe even a little bit of active directory. After you watch this course from here, you should be able to feel comfortable and diving into some other courses within the Siri's or even branching out and looking at the ethical hacking Siri's. I hope that you'll join me in this adventure in learning with the issues of identity and access management course here at plural site.