LearnKey Training

CISSP Identity and Access Management 2015 Course

CISSP Identity and Access Management 2015 Course

CISSP Identity and Access Management 2015 Course

1 Sessions -
2 Hours of Interactive Training

LearnKey's CISSP Identity and Access Management 2015 course is one of 8 domains making up the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). Join LearnKey expert Michael Solomon as he presents information on third-party identity services, assets control, access control attacks, and more! At the conclusion of this course, learners will be familiar with the issues and concepts of the Identity and Access Management knowledge required to pass the CISSP exam.

  • Be up-to-date with training based on the most recent CISSP CBK
  • Interactive labs, and dozens of pre/post test questions
  • View your online courseware anytime, anywhere

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Physical and Logical Access to Assets

  • Access Control Basics
  • Least Privilege and Accountability
  • Physical Access Controls
  • Physical Access Control System
  • Administrative and Logical Controls

Section B: Identification and Authentication

  • Identity Control Implementation
  • Access Control Implementation
  • Single Sign-On
  • Kerberos
  • Identification vs. Authentication
  • Knowledge-Based Authentication
  • Tokens, Tickets, and One-Time Passwords
  • Characteristic-Based Authentication

Section C: Auditing

  • Accountability
  • Session Management
  • Registration and Proof of Identity
  • Federated Identity Management
  • Credential Management Systems

Section D: Identity as a Service

  • IDaaS Functions, Features, and Benefits
  • IDaaS Issues
  • Integrate Third-Party Identity Services

Section E: Authorization Mechanisms

  • Access Control Techniques
  • Security Labels
  • Mandatory Access Control
  • Rule-Based Access Control
  • Non-Discretionary Access Control
  • Access Control Lists

Section F: Attacks and Monitoring

  • Methods of Attack
  • Access Control Assurance
  • Monitoring
  • Intrusion Detection
  • Penetration Testing
  • Provisioning Lifecycle Factors
  • Access Review