Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Introduction to Identity and Access Management

Posted By: IrGens
Introduction to Identity and Access Management

Introduction to Identity and Access Management
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 57m | 205 MB
Instructor: Mandy Huth

Your systems and resources are your organization’s lifeline. If your data falls into the wrong hands, you could stand to lose it all. Especially now, in a world where credential theft is so pervasive, you need to be able to validate who your users are and what they can access within your organization. Join cybersecurity leader Mandy Huth for an introduction to identity and access management, a core component of your company’s security posture, and its first line of defense against threats and attacks.

Explore the key concepts of identity as part of standard security frameworks used to authenticate users, groups, assets, and other entities. Learn the basics of granting permissions to designated users with enhanced access control features such as single sign-on, multi-factor authentication, least privilege, and birthright access. By the end of this course, you’ll be ready to implement a zero-trust capability, role mining, best practices for passwords, and conditional access.


Introduction to Identity and Access Management