Skip main navigation

Identity Access Management Concepts

In this video, you will learn about some important concepts and definitions in identity and access management. Once you have watched the video, take the concept of identifying and giving …

Comparisons of the Access Control Models (Continued)

In this video, you will be introduced to three other control models, role-based access control (RBAC), rule-based access control (RAC), and attribute-based access control (ABAC). Reflect and share: Which of …

Perimeter Security in the Digital Space

In this video, you will learn about security perimeters in the digital space. Once you’ve watched the video, think about how you might approach the following: How would you define …

Comparisons of the Access Control Models

In this video, you will learn more about discretionary access control (DAC) and mandatory access control (MAC). These two models will be compared in terms of its benefits and limitations. …

Access Control

In this video, you will learn about the different types of access controls systems. Each access control system has its benefits and is appropriate for different work environments. Reflect and …

Types of Permissions: Privilege Granularity

In this video, you will learn about the last type of permission, privilege granularity. Privilege granularity allows you to tailor permissions appropriately and manage inherited permissions. Reflect and share: Domain …

Centralized Accounting

In this video, you will learn about centralized accounting. Centralized accounting will help you to: log review processes log aggregation improve business intelligence

Accounting Considerations

In this video, you will learn about accounting considerations. Effective identity authentication and authorization should result in high data logging accountability. Investigate and share: Review your own accounting approach in …

Security Kernel

In this video, you will learn about security kernels; that is, the reference monitor that mediates access. Every security must do the following: isolate processes mediate all access provide a …

What is Authorization?

In this video, you will learn what authorization is in the context of IdAM. Importantly, authorization is different to authentication. In the IdAM context, authorization refers to the function of …

Adaptive Authorization

In this video, you will learn about adaptive authorization and how it is used. For example, if an employee accesses a network via a VPN instead of their unmasked IP …

Privileged Access Management (Continued)

In this video, you will learn more about privileged access and what tools you can use to manage this. Here are three tips to take forward: minimise credentials minimise usage …

Service Standards

In this video, you will learn about different service standards needed for IdAM. The customer and customer service provider perspectives are considered. Reflect and share: Considering your own situation, are …