Identity and Access Management for CompTIA Security+

User account and access management is a foundational concept that is critical to an organization's overall information security health. This course teaches you the different concepts and technologies associated with identity and access management.
Course info
Rating
(14)
Level
Beginner
Updated
Oct 24, 2017
Duration
1h 40m
Table of contents
Course Overview
Comparing and Contrasting Identity and Access Management Concepts
Installing and Configuring Identity and Access Services
Implementing Identity and Access Management Controls
Differentiating Common Account Management Practices
Description
Course info
Rating
(14)
Level
Beginner
Updated
Oct 24, 2017
Duration
1h 40m
Description

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you'll learn the critical foundational concepts that form the building blocks of every company's information security posture. First, you'll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you'll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you'll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you'll have a better understanding of user account and access management, and you'll be able to take this knowledge into the Security+ exam.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Christopher Rees, and welcome to my course: Identity and Access Management for CompTIA Security+ In addition to being a trainer here at Pluralsight, I'm a former law enforcement officer, who specialized in computer crimes, and I have over 20 years of enterprise IT experience. I've also been training students from all over the world, since 1998. So, In this course we're going to cover the various concepts and technologies associated with identity and access management, ensuring users can securely access the resources they need to do their jobs, and ultimately, generate revenue. So, some of the major topics we will cover in this course include multi-factor authentication concepts. We'll talk about identity access services, like Kerberos, SAML, OpenID. Oauth, and RADIUS. We'll also talk about access control models, including mandatory access controlled, discretionary access controlled, and also rule-based and role-based access controlled. Biometric authentication controls and their associated concerns. We'll also talk about account management best practices, including account types, maintenance, and policy enforcement. So, by the end of this course, you'll know the key concepts and technologies associated with identity and access management. Making sure your users can access the data and the resources they need safely and securely. Before beginning this course, having some exposure to CompTIA's A+, or Network+ is helpful, but not a requirement. And by the end of this course you'll be ready for the CompTIA Security+ Certification Exam, as well as some advanced security courses, such as CompTIA's Advanced Security Practitioner, and also Malware Analysis: The Big Picture. So, I hope you'll join me on this journey to learn identity and access management with the identity and access manager for CompTIA Security+ Course, here at Pluralsight.

Comparing and Contrasting Identity and Access Management Concepts
Hey welcome back to Pluralsight. I'm your instructor Christopher Rees. And in this course we'll be covering Identity and Access Management. And in this module we'll be covering Identity and Access Management Concepts. So to talk about what we're going to cover here, we have a few things, we have identification, authentication, authorization and accounting, otherwise known as AAA, authentication, authorization, and accounting. We have multifactor authentication which is basically something that you are, something that you have, something that you know, somewhere where you are, or something that you do. We'll also talk about the concept of a federation, a single sign-on, and also a transitive trust. So let's go ahead and get started.

Installing and Configuring Identity and Access Services
Hey everybody, welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this module we'll be covering installing and configuring identity and access services. We have a lot of good information to cover in this module. We'll be talking about LDAP. We'll be talking about Kerberos, TACACS+, CHAP, PAP, and MSCHAP. Also talking about RADIUS, SAML, OpenID Connect, OAuth, Shibboleth, Secure token, and then NTLM. Basically all the different ways that we can authenticate, or connect to and be authorized to use, a specific service. The goal of this module is very simply to understand the importance of identity and access services, and the role that they play in increasing security, and reducing risk, and also expediting remediation. If in fact we're breached, how can we get back on our feet quicker?

Implementing Identity and Access Management Controls
Hey, welcome back to Pluralsight. I'm your instructor Christopher Rees, and in this module we're going to cover Implement Identity and Access Management Controls. So, a lot of good information broken up into six main categories. We have access control models, we have physical access control, biometric factors, tokens, certificate-based authentication, and then filesystem and database security. And then inside each one of these categories, we have some additional information: access control models such as mandatory access control, discretionary access control, attribute-based access control, which is relatively new, and then role-base and rule-based access control, or RBAC. Within physical access control we have proximity cards and smart cards. In biometric factors, we have a few things we've covered before along with some additional pieces of information: fingerprint scanner, retinal scanner, and iris scanners. Also talk about voice recognition and facial recognition. Also false acceptance rate, false rejection rate, and then also crossover error rate. Under tokens, we have hardware and software-based tokens, and then we have HOTP, or HMAC-based one-time password, and also TOTP, which is time-based one-time password. Then we have certificate-based authentication, including PIVs and CACs, along with smart cards, and then also something referred to as I triple E 802. 1x, and then we have a file system security and database security. So a lot of good information in here, so let's go ahead and get started.

Differentiating Common Account Management Practices
Hey, welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this module we'll be covering differentiating common account management practices. So in this module, we have a lot of good information. We have three main areas that I want to cover. We have account types, and we have general concepts, and then account policy enforcement. So it might sound like there's not a lot there, but trust me, there is quite a bit to be covered. So under account types, you can see what we have here, user accounts, shared and generic accounts and credentials, and so forth. I won't read through all of these, you can pause it if you need to to get a quick overview of what we're covering. But all of these concepts and technologies are extremely important if you're going to be an effective account administrator, and also a successful security practitioner, because these best practices are the cornerstone that gives you a secure environment. If these things are lacking or there's gaps in these things that we're covering here, you're basically leaving the door wide open for someone to come in to your network or your environment, wreak havoc, exfiltrate data, and so forth. So let's go ahead and get started.