CISSP® - Identity and Access Management

This course is an overview of the Identity and Access Management objective for the CISSP®, which includes the threats, theories, and concepts that are part of managing access to a diverse set of technologies and systems.
Course info
Rating
(19)
Level
Intermediate
Updated
Mar 23, 2017
Duration
2h 24m
Table of contents
Description
Course info
Rating
(19)
Level
Intermediate
Updated
Mar 23, 2017
Duration
2h 24m
Description

Access controls lie at the very heart of an information security program. After all, information security is all about access control - who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® - Identity and Access Management, you'll learn about the concepts and theory of identity and access management. Next, you'll learn about mandatory and discretionary access control along with types of controls and related risk. Finally, you'll learn about access control attacks. By the end of this course, you'll have an understanding of identity and access management and be able to approach these areas in the CISSP® examination with confidence.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Communications and Network Security
Intermediate
2h 59m
18 Sep 2018
Physical Security
Intermediate
1h 19m
6 Aug 2018
Cryptography Application
Intermediate
2h 22m
3 Aug 2018
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Kevin Henry, a security and risk consultant, and a holder of the CISSP certification. Welcome, to my course in Identity and Access Management - one of the eight domains that make up the CISSP examination. This course is an overview of identity and access management, including the threats, theories, and concepts that are part of the managing access to a diverse set of technologies and systems. This course will help you prepare for ISC-Squared's CISSP, that is the Certified Information System Security Professional examination. I work in outreach as a security evangelist at Team Cymru, and I have been involved in the development of the CISSP for many years, including nearly a decade as the vice-president of education at ISC-Squared. Access controls lie at the very heart of an information security program; after all, in the end, information security is all about access control. Who can get on our systems, networks, and into our buildings, and what can they do when they gain access? We need to build resilient and robust access control systems that will withstand attacks and prevent compromise, whether those attacks come from internal or external sources. Some of the major topics we will cover include: the concepts and theory of identity in access management, mandatory and discretionary access control, types of controls and related risk, and access control attacks. By the end of this course, you'll have an understanding of identity and access management, and be able to approach these areas in the CISSP examination with confidence. From here, you should also feel comfortable diving to the rest of the domains of the CISSP. I hope you'll join me on this journey to learn all about identity and access management with this essential part of the CISSP course, here at Pluralsight.