In this video, you will learn about the four different types of stakeholders and the importance of gaining their buy-in in the governance phase. Stakeholders to involve are: business owners …
In this video, you will learn about the business case for governance. Particularly, this speaks to the business drivers for IdAM such as improving operational efficiency and avoiding security incidents …
In this video, you will learn about monitoring processes, access reviews, and reporting processes. Once you have watched the video, read the recap below: We need to monitor all processes. …
In this video, you will learn about the deprovisioning process; that is, removing access to a system. Once you have watched the video, consider the following: do you need to …
In this video, you will learn about credit issuance and managing change. When dealing with credential issuance processes, you should take the following into consideration: secure issuance process in-person verification …
In this video, you will learn about self-service and automation. An advantage of self-service processes is that it may help to reduce costs and increase efficiency. However, it can also …
In this video, you will learn about the provisioning process. Once you have viewed the video, read the recap below: provisioning processes should link to the incident/case management system so …
In this video, you will learn about derived credentials, a strong type of authentication for mobile devices. Once you have viewed the video, read the recap below: derived credentials come …
In this video, you will learn about the credential selection process. Credentials can be used to authenticate a user or act as an identifier. The credential selection process needs to …
In this video, you will learn about the review and approval process. Once you have viewed the video, read through the following points: the review process typically refers to the …
In this video, you will learn about the importance of organizational processes and be introduced to the registration process. Organizational processes should consider the following: manual versus automated processes process …
In this video, you will learn about biometric considerations and factors that can influence its effectiveness. The following biometric considerations will be covered: universality uniqueness measurability performance acceptability circumvention
In this video, you will learn about the different biometric authentication types. In addition, each type will be compared in terms of its accuracy, invasiveness, acceptability, and throughput, to help …
In this video, you will learn about biometric authentication. You will learn what it is, how it works, and see examples of it used in the IdAM context. Reflect and …
In this video, you will learn about radio frequency identification (RFID) tokens and their role and limitations in maintaining cybersecure processes related to authentication. Reflect and share: Once you’ve watched …