Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https://niccs.us-cert.gov/training/search/skillsoft/cissp-identity-and-access-management-iam
- Learning Objectives
- CISSP 2018: Identity and Access Management (IAM)
- control physical and logical asset access
- manage the identification and authentication of entities
- integrate identity as a third-party service
- implement and manage authorization mechanisms
- describe various access control models
- recall how to implement identity management
- describe access review and provisioning
- describe various federated services
- describe identity and access management
- ##############################################################
- https://niccs.us-cert.gov/training/search/pluralsight/issues-identity-and-access-management-iam
- Learning Objectives
- Managing Identity
- Other Authentication Methods
- Identity Repositories
- Exploits
- ##############################################################
- https://niccs.us-cert.gov/training/search/skillsoft/data-management-and-device-security
- Learning Objectives
- File and Print Sharing
- start the course
- configure NTFS permissions
- configure Share permissions
- share files using Windows Homegroups
- install and manage printers
- view effective permissions on files and folders
- create public shares in Windows
- create basic shares in Windows
- create advanced shares in Windows
- Data Encryption
- enable and use EFS
- move or copy data that is secured using Windows EFS
- implement BitLocker To Go
- configure a client VPN connection
- manage certificates in Windows
- describe the role of SSL in data encryption
- use public and private keys during cryptography
- Internet, Intranet, and Extranet
- describe private networks
- describe public networks
- describe the Windows Firewall
- describe cloud-based services
- User Authentication
- use Multi-Factor Authentication in Azure
- use smart cards for authentication
- describe Windows Rights Management
- use biometrics for authentication
- use password procedures for authentication
- configure file and share permissions
- Practice: Configuring Share Permissions
- create and share a folder, set folder permissions, and encrypt a file
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement