Authentication, Authorization, & Identity Engineering

Authentication, Authorization, & Identity Engineering

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 19 Lessons (4h 25m) | 3.21 GB

Anyone who uses a computer on a daily basis needs to have an account. For organizations of any size, those accounts need to be properly secured and managed using a well-designed identity management program. This course will go into detail about various authentication types and authorization mechanisms that are used to grant needed access to an organization’s resources. In addition, we’ll look at how to securely set up and identity management system – from creation of accounts, to integrating with other systems, all the way through logging and monitoring. We’ll also go over the identity and access management lifecycle, and how it plays a critical part in securing the authentication and authorization systems for any organization.

Table of Contents

1 Course Introduction
2 Authentication, Authorization, & Accounting
3 Authentication Types
4 Authorization Mechanisms
5 Active Directory Overview
6 RBAC in AD
7 Active Directory Federation
8 Native Linux Authentication
9 Integrating Linux with AD
10 Single Sign On
11 Multifactor Authentication
12 Just in Time Access
13 Authentication & Authorization Logging
14 Active Directory Monitoring
15 Active Directory Logging Demo
16 Linux Monitoring
17 IAM Lifecycle
18 Phases of IAM Lifecycle
19 Course Conclusion

Homepage