Advertisement
Guest User

Untitled

a guest
Feb 28th, 2020
312
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.25 KB | None | 0 0
  1. https://niccs.us-cert.gov/training/search/skillsoft/cissp-identity-and-access-management-iam
  2.  
  3. Learning Objectives
  4.  
  5. CISSP 2018: Identity and Access Management (IAM)
  6.  
  7. control physical and logical asset access
  8. manage the identification and authentication of entities
  9. integrate identity as a third-party service
  10. implement and manage authorization mechanisms
  11. describe various access control models
  12. recall how to implement identity management
  13. describe access review and provisioning
  14. describe various federated services
  15. describe identity and access management
  16.  
  17. ##############################################################
  18.  
  19. https://niccs.us-cert.gov/training/search/pluralsight/issues-identity-and-access-management-iam
  20. Learning Objectives
  21.  
  22. Managing Identity
  23. Other Authentication Methods
  24. Identity Repositories
  25. Exploits
  26.  
  27. ##############################################################
  28.  
  29. https://niccs.us-cert.gov/training/search/skillsoft/data-management-and-device-security
  30. Learning Objectives
  31.  
  32. File and Print Sharing
  33.  
  34. start the course
  35. configure NTFS permissions
  36. configure Share permissions
  37. share files using Windows Homegroups
  38. install and manage printers
  39. view effective permissions on files and folders
  40. create public shares in Windows
  41. create basic shares in Windows
  42. create advanced shares in Windows
  43.  
  44. Data Encryption
  45.  
  46. enable and use EFS
  47. move or copy data that is secured using Windows EFS
  48. implement BitLocker To Go
  49. configure a client VPN connection
  50. manage certificates in Windows
  51. describe the role of SSL in data encryption
  52. use public and private keys during cryptography
  53.  
  54. Internet, Intranet, and Extranet
  55.  
  56. describe private networks
  57. describe public networks
  58. describe the Windows Firewall
  59. describe cloud-based services
  60.  
  61. User Authentication
  62.  
  63. use Multi-Factor Authentication in Azure
  64. use smart cards for authentication
  65. describe Windows Rights Management
  66. use biometrics for authentication
  67. use password procedures for authentication
  68. configure file and share permissions
  69.  
  70. Practice: Configuring Share Permissions
  71.  
  72. create and share a folder, set folder permissions, and encrypt a file
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement