In this video, you will learn what to consider when conducting a risk assessment in the IdAM context. You will also learn how this affects the business case and the …
In this video, you will learn about blockchain, a decentralized database, in the IdAM context. Once you have watched the video, consider the following challenges that you will need to …
In this video, you will learn about implementation in the IdAM context. Specifically, you will learn about the different implementation phases, approach types, and aspects that relate to the business …
The following test is going to assess your understanding of what you have learned within this past week of the course. Remember, you do not have to take the test …
The following test is going to assess your understanding of what you have learned within this past week of the course. Remember, you do not have to take the test …
Let’s wrap up what you have learned from part 1 and part 2 of this course! Identity and access management is an increasingly complex but critical area of IT security. …
This week, you will be introduced to four case studies. Each case study will focus on different aspects of the course, as well as touch on some of the material …
Let’s wrap-up what you have learned. SSO is concerned with ‘login’ and, historically, within a single domain Identity federation and federation identity management is concerned with a complete identity and …
Asset management can refer to the management of a physical asset, such as a physical server room, an online service, such as cloud services, or something virtual, such as system …
In this course, you will see 4 quizzes. Quizzes are for practice. They do not contribute toward your final score. They’re a fantastic opportunity for you to check your progress …
Welcome to Cyber Security Foundations: Reinforcing Identity and Access Management. In the previous course, you were introduced to some key concepts (‘identification’, ‘authentication, and ‘authorization’), data governance, and some organizational …
The following test is going to assess your understanding of what you have learned within this past week of the course. Remember, you do not have to take the Test …
Let’s wrap up what you have learned. We’ve looked at the assorted technical standards and the solutions that exist to help meet the broad range of requirements of a modern …
Public Key Infrastructure (PKI) PKI is a collection of technologies. It entails a set of roles, policies, and procedures. PKI is an arrangement that binds public keys to the respective …
Introducing Kerberos On the local area network, one of the longstanding forms of authentication protocols is Kerberos. Kerberos uses the concept of a ticket system to allow computers to establish …