CySA+ Cert Prep: 5 Identity and Access Management | Mike Chapple | LYNDA

CySA+ Cert Prep: 5 Identity and Access Management | Mike Chapple | LYNDA
English | Size: 297.56 MB
Category: Tutorial

Earning the CompTIA Cybersecurity Analyst (CySA+) certification indicates that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course-the fifth installment in the CySA+ Cert Prep series-review key identity and access management concepts that can prepare you for the second part of domain four, Security Architecture and Tool Sets. Instructor Mike Chapple dives into the three major steps of the access management process-identification, authentication, and authorization; discusses different means of identification; and goes over discretionary and mandatory access controls. He also covers access control exploits, discussing watering hole attacks, impersonation attacks, session hijacking, and more. [Read more…]

CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA

CISSP Cert Prep: 5 Identity and Access Management (2018) | Mike Chapple | LYNDA
English | Size: 339.34 MB
Category: Tutorial

Prepare for the CISSP exam while you learn industry best practices for identity and access management (IAM). IAM is covered in the fifth domain of the exam, and comprises 13% of the test questions for the highly prized IT security certification. This course includes coverage of the core components of IAM: identification, authentication, authorization, and accountability. Learn how to control both the physical and logical access to your hardware, information systems, and data. Instructor Mike Chapple, the author of our nine-part CISSP test prep series, also covers credential management, external identity management, and prevention and mitigation of access control attacks. Members who take all eight courses in the series will be prepared to take the CISSP exam [Read more…]

CBT Nuggets Identity With Windows Server 2016 Exam 70-742

CBT Nuggets Identity With Windows Server 2016 Exam 70-742
English | Size: 1.81 GB
Category: CBTs

This Microsoft Windows Server 2016 course with Anthony Sequeira prepares you for the popular Microsoft 70-742 exam. This exam digs incredibly deep into the world of Active Directory and its associated technologies. You also learn a lot of PowerShell along the way! [Read more…]

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes

Packt Publishing – Windows Server 2016, Hybrid Identity, and Access Management Recipes
English | Size: 713.17 MB
Category: Microsoft

Build a hybrid identity and access management solution with cloud connectivity using Windows Server 2016 and Azure AD

This course provides practical recipes to handle the administrative tasks of Windows Server 2016 and a suitable hybrid Cloud Identity & Access Management solution. You will get familiar with the related Windows Server 2016 services and the Microsoft Cloud capabilities like Azure AD, Microsoft Intune, and Office 365. [Read more…]

Protecting Your Internet Identity

Protecting Your Internet Identity
English | Size: 5.65 MB
Category: CBTs

People research everything online – shopping, school, jobs, travel – and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government’s voracious appetite for personal data. A new chapter on the right to be forgotten explores the origins and current effects of this new legal concept, and shows how the new right could affect us all. Timely information helping to protect your children on the Internet and guarding your business’s online reputation has also been added. [Read more…]

Identity, Application, and Network Services on Microsoft Azure

Identity, Application, and Network Services on Microsoft Azure
English | Size: 394.29 MB
Category: Engineering

This course prepares developers for the "manage identity, application, and network services" portion of the Microsoft 70-532 Developing Microsoft Azure Solutions exam.

This course, Identity, Application, and Network Services on Microsoft Azure, covers the identity, application, and network services objectives in the 70-532 Developing Microsoft Azure Solutions exam. First, you will learn how to integrate apps with Azure Active Directory (AD). Then, you will gain an understanding of Azure messaging services. Finally, you will discover how to develop apps that use Azure AD B2B and B2C. By the end of this course, you will be able to gain the 70-532 certification, and be up to speed with integrating the identity and messaging services available to you in Microsoft Azure. [Read more…]

Pearson IT Certification – Windows Server 70-742 Identity with Windows Server 2016 Livelessons

Pearson IT Certification – Windows Server 70-742 Identity with Windows Server 2016 Livelessons
English | Size: 6.95 GB
Category: CBTs

Windows Server 70-742: Identity with Windows Server 2016 Complete Video Course covers the five objective domains for the Windows Server 70-742 exam. You learn concepts and see live demonstrations on how to complete administrative tasks associated with Windows Server 2016. Whether you’re new to Windows Server 2016 Identity Services or preparing to take the Microsoft Windows Server 70-742 exam, this course is designed for you. [Read more…]

Pluralsight – Identity and Access Management for CompTIA Security+

Pluralsight – Identity and Access Management for CompTIA Security+
English | Size: 196.41 MB
Category: CBTs

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you’ll learn the critical foundational concepts that form the building blocks of every company’s information security posture. First, you’ll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you’ll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you’ll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you’ll have a better understanding of user account and access management, and you’ll be able to take this knowledge into the Security+ exam.
[Read more…]

Lynda – Microsoft Cybersecurity Stack – Identity and Endpoint Protection Basics

Lynda – Microsoft Cybersecurity Stack – Identity and Endpoint Protection Basics
English | Size: 256.50 MB
Category: Tutorial

The traditional model of the network perimeter is dead. The perimeter-where access and authorization are enforced-can be anywhere, on any device. With the evolution of Microsoft Enterprise Mobility + Security (EMS) and Azure, the Microsoft enterprise cybersecurity story is growing increasingly more exciting. The Microsoft Cybersecurity Stack series of courses provides IT pros with a holistic view of the Microsoft cybersecurity stack, and how to configure those components to strengthen an organization’s security posture. These hands-on courses demonstrate how to configure EMS and Azure features, and how to combine them for greatest effect.
[Read more…]

Pluralsight – The Issues of Identity and Access Management (IAM)

Pluralsight – The Issues of Identity and Access Management (IAM)
English | Size: 398.82 MB
Category: CBTs

In this course, you’ll learn how to look at IAM in the proper perspective, as well as the security issues that you should be aware of in your own organization.

IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. [Read more…]

Skip to toolbar