CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA

CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA
English | Size: 339.34 MB
Category: Tutorial

Prepare for the CISSP exam while you learn industry best practices for identity and access management (IAM). IAM is covered in the fifth domain of the exam, and comprises 13% of the test questions for the highly prized IT security certification. This course includes coverage of the core components of IAM: identification, authentication, authorization, and accountability. Learn how to control both the physical and logical access to your hardware, information systems, and data. Instructor Mike Chapple, the author of our nine-part CISSP test prep series, also covers credential management, external identity management, and prevention and mitigation of access control attacks. Members who take all eight courses in the series will be prepared to take the CISSP exam [Read more…]

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes
English | Size: 713.17 MB
Category: Microsoft

Build a hybrid identity and access management solution with cloud connectivity using Windows Server 2016 and Azure AD

This course provides practical recipes to handle the administrative tasks of Windows Server 2016 and a suitable hybrid Cloud Identity & Access Management solution. You will get familiar with the related Windows Server 2016 services and the Microsoft Cloud capabilities like Azure AD, Microsoft Intune, and Office 365. [Read more…]

Pluralsight – Identity and Access Management for CompTIA Security+

Pluralsight – Identity and Access Management for CompTIA Security+
English | Size: 196.41 MB
Category: CBTs

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you’ll learn the critical foundational concepts that form the building blocks of every company’s information security posture. First, you’ll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you’ll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you’ll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you’ll have a better understanding of user account and access management, and you’ll be able to take this knowledge into the Security+ exam.
[Read more…]

Pluralsight – The Issues of Identity and Access Management (IAM)

Pluralsight – The Issues of Identity and Access Management (IAM)
English | Size: 398.82 MB
Category: CBTs

In this course, you’ll learn how to look at IAM in the proper perspective, as well as the security issues that you should be aware of in your own organization.

IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. [Read more…]

Pluralsight – AWS Security Operations – Securing Access to Object Storage

Pluralsight – AWS Security Operations – Securing Access to Object Storage
English | Size: 274.99 MB
Category: CBTs

This course demonstrates how to utilize AWS security services and features to stay safe and compliant, while deploying S3 storage and CloudFront in the AWS Cloud using recommended security best practices.
Designing with a security mindset when considering all aspects of your AWS deployment is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk.
[Read more…]

Lynda – Exchange 2016 Client Access Services

Lynda – Exchange 2016: Client Access Services
English | Size: 279.02 MB
Category: E-learning | others

Find out how to configure client access, set up namespaces, manage mobility solutions, improve load balancing, troubleshoot connectivity, and make sites resilient. Scott Burrell shows how to set up and administer primary client access services in this course. He explains and demonstrates the step involved in planning namespaces, redirecting access, authenticating users, working with offline address books, managing certificates, and more. This course is also an exam preparation resource, as it covers the topics in the 70-345 exam-Exchange 2016: Client Access Services. [Read more…]

Pluralsight – Cisco ISE Guest Access for CCNP Security (300-208) SISAS

Pluralsight – Cisco ISE Guest Access for CCNP Security (300-208) SISAS
English | Size: 284.86 MB
Category: CBTs

This course builds on a series designed to cover topics of the 300-208 SISAS course by teaching how Cisco ISE Guest Access is configured.
This course builds on a series designed to cover topics of the 300-208 SISAS course by teaching how Cisco ISE Guest Access is configured. It’s designed to be viewed after the introduction and access control courses, as those configurations are required to complete the labs that are demonstrated. In this course, Cisco ISE Guest Access for CCNP Security (300-208) SISAS, you’ll be introduced to Web authentication (WebAuth), and the components required to enable Web authentication for end users. [Read more…]

Pluralsight – CISSP® – Identity and Access Management

Pluralsight – CISSP® – Identity and Access Management
English | Size: 184.15 MB
Category: Tutorial

This course is an overview of the Identity and Access Management objective for the CISSP®, which includes the threats, theories, and concepts that are part of managing access to a diverse set of technologies and systems.
Access controls lie at the very heart of an information security program. After all, information security is all about access control – who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® – Identity and Access Management, you’ll learn about the concepts and theory of identity and access management.
[Read more…]

Lynda – Windows Server 2016 – Remote Access Solutions

Lynda – Windows Server 2016 – Remote Access Solutions
English | Size: 303.23 MB
Category: Tutorial

System admins, whether experienced with or new to Windows Server 2016, can learn how to install and configure remote access services in this course. Scott Burrell covers setting up private intranets on public extranets, implementing virtual private networks, RADIUS installation, working with a network policy server, and configuration of DirectAccess. He also covers network address translation, remote authentication services, and more. [Read more…]

Lynda – Up and Running with VBA in Access

Lynda - Up and Running with VBA in Access

Title: Lynda – Up and Running with VBA in Access
Video Format: MP4
File Size: 534 MB
More info
[Read more…]