Lynda – Migrating Access Databases to SQL Server

Lynda – Migrating Access Databases to SQL Server
English | Size: 389.93 MB
Category: CBTs

At one point Access was adequate. But what happens when your database grows and you need more powerful tools? You can move it! Migration allows you to take advantage of SQL Server’s advanced features, and maintain a link to the data in Access.
[Read more…]

SSCP Cert Prep: 1 Access Controls (05/2018) | Mike Chapple | LYNDA

SSCP Cert Prep: 1 Access Controls (05/2018) | Mike Chapple | LYNDA
English | Size: 227.47 MB
Category: Tutorial

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Access Controls, the first domain, which comprises 16% of the questions on the exam. Topics include identification, authorization, and authentication, including multifactor and mobile device authentication. Learn about the identity management life cycle, and find out how to implement authentication mechanisms and access controls. [Read more…]

CySA+ Cert Prep: 5 Identity and Access Management | Mike Chapple | LYNDA

CySA+ Cert Prep: 5 Identity and Access Management | Mike Chapple | LYNDA
English | Size: 297.56 MB
Category: Tutorial

Earning the CompTIA Cybersecurity Analyst (CySA+) certification indicates that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course-the fifth installment in the CySA+ Cert Prep series-review key identity and access management concepts that can prepare you for the second part of domain four, Security Architecture and Tool Sets. Instructor Mike Chapple dives into the three major steps of the access management process-identification, authentication, and authorization; discusses different means of identification; and goes over discretionary and mandatory access controls. He also covers access control exploits, discussing watering hole attacks, impersonation attacks, session hijacking, and more. [Read more…]

INE – Managing Cloud Environment Access With AWS Identity And Access Manager (IAM)

INE – Managing Cloud Environment Access With AWS Identity And Access Manager (IAM)
English | Size: 163.81 MB
Category: CNTs

If you work with IT you know that to manage users, groups, permissions, etc can be difficult, but Amazon created AWS IAM, the resource that you will in order to improve the security or your cloud environment. This course will teach you everything you need to know in order to start dealing with all IAM configuration including policies creation, encryption with your personal keys (AWS KMS) and much more. [Read more…]

CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA

CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA
English | Size: 339.34 MB
Category: Tutorial

Prepare for the CISSP exam while you learn industry best practices for identity and access management (IAM). IAM is covered in the fifth domain of the exam, and comprises 13% of the test questions for the highly prized IT security certification. This course includes coverage of the core components of IAM: identification, authentication, authorization, and accountability. Learn how to control both the physical and logical access to your hardware, information systems, and data. Instructor Mike Chapple, the author of our nine-part CISSP test prep series, also covers credential management, external identity management, and prevention and mitigation of access control attacks. Members who take all eight courses in the series will be prepared to take the CISSP exam [Read more…]

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes
English | Size: 713.17 MB
Category: Microsoft

Build a hybrid identity and access management solution with cloud connectivity using Windows Server 2016 and Azure AD

This course provides practical recipes to handle the administrative tasks of Windows Server 2016 and a suitable hybrid Cloud Identity & Access Management solution. You will get familiar with the related Windows Server 2016 services and the Microsoft Cloud capabilities like Azure AD, Microsoft Intune, and Office 365. [Read more…]

Pluralsight – Identity and Access Management for CompTIA Security+

Pluralsight – Identity and Access Management for CompTIA Security+
English | Size: 196.41 MB
Category: CBTs

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you’ll learn the critical foundational concepts that form the building blocks of every company’s information security posture. First, you’ll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you’ll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you’ll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you’ll have a better understanding of user account and access management, and you’ll be able to take this knowledge into the Security+ exam.
[Read more…]

Pluralsight – The Issues of Identity and Access Management (IAM)

Pluralsight – The Issues of Identity and Access Management (IAM)
English | Size: 398.82 MB
Category: CBTs

In this course, you’ll learn how to look at IAM in the proper perspective, as well as the security issues that you should be aware of in your own organization.

IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. [Read more…]

Pluralsight – AWS Security Operations – Securing Access to Object Storage

Pluralsight – AWS Security Operations – Securing Access to Object Storage
English | Size: 274.99 MB
Category: CBTs

This course demonstrates how to utilize AWS security services and features to stay safe and compliant, while deploying S3 storage and CloudFront in the AWS Cloud using recommended security best practices.
Designing with a security mindset when considering all aspects of your AWS deployment is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk.
[Read more…]

Lynda – Exchange 2016 Client Access Services

Lynda – Exchange 2016: Client Access Services
English | Size: 279.02 MB
Category: E-learning | others

Find out how to configure client access, set up namespaces, manage mobility solutions, improve load balancing, troubleshoot connectivity, and make sites resilient. Scott Burrell shows how to set up and administer primary client access services in this course. He explains and demonstrates the step involved in planning namespaces, redirecting access, authenticating users, working with offline address books, managing certificates, and more. This course is also an exam preparation resource, as it covers the topics in the 70-345 exam-Exchange 2016: Client Access Services. [Read more…]