CISSP® - Identity and Access Management

This course is an overview of the Identity and Access Management objective for the CISSP®, which includes the threats, theories, and concepts that are part of managing access to a diverse set of technologies and systems.
Course info
Level
Intermediate
Updated
March 23, 2017
Duration
2h 24m
Table of contents
Description
Course info
Level
Intermediate
Updated
March 23, 2017
Duration
2h 24m
Description

Access controls lie at the very heart of an information security program. After all, information security is all about access control - who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® - Identity and Access Management, you'll learn about the concepts and theory of identity and access management. Next, you'll learn about mandatory and discretionary access control along with types of controls and related risk. Finally, you'll learn about access control attacks. By the end of this course, you'll have an understanding of identity and access management and be able to approach these areas in the CISSP® examination with confidence.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
CSSLP®: Secure Software Design
Intermediate
5h 48m
10 Oct 2017
CSSLP®: Secure Software Requirements
Intermediate
3h 24m
28 Aug 2017
CSSLP®: Secure Software Concepts
Intermediate
4h 35m
8 Aug 2017
More courses by Kevin Henry
Transcript
Transcript

Hi everyone, my name is Kevin Henry, a security and risk consultant and a holder of the CISSP certification. Welcome to my course on Identity and Access Management – one of the eight domains that make up the CISSP examination. This course is an overview of Identity and Access Management – including the threats, theories and concepts that are part of managing access to a diverse set of technologies and systems. This course will help you prepare for (ISC)2’s CISSP (Certified Information Systems Security Professional) Examination.

I work in Outreach as a Security Evangelist at Team Cymru and I have been involved in the development of the CISSP for many years including nearly a decade as the Vice President of Education at ISC2.

Access Controls lie at the very heart of an Information Security program. After all, in the end, Information security is all about access control – who can get on our systems, networks and into our buildings – and what can they do when they gain access? We need to build resilient and robust access control systems that will withstand attacks and prevent compromise – whether those attacks come form external or internal sources.

Some of the major topics that we will cover include:

  1. The concepts and theory of identity and access management
  2. Mandatory and Discretionary Access Control
  3. Types of controls and related risk
  4. Access Control attacks
By the end this course, you’ll have an understanding of Identity and access management and be able to approach these areas in the CISSP examination with confidence.

From here, you should feel comfortable diving into the rest of the domains of the CISSP.

I hope you’ll join me on this journey to learn about Identity and Access Management with this essential part of the CISSP course, at topwallpaper.