Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Services Module Overview
- RADIUS
- TACACS
- Kerberos
- LDAP Secure
- LDAP SAML
- Module Review Authentication
- Authorization and Access Control Review Identification vs. Authentication vs. Authorization
- Identification Personal Identification
- Verification Card
- Username Authentication
- Tokens Common Access
- Card Multifactor
- Authentication TOTP HOTP CHAP PAP
- Single Sign-on Access Control
- Implicit Deny
- Trusted OS Authentication Factors
- Authorization
- Separation of Duties
- ACLs Mandatory Access Control Discretionary
- Role Based and Rule Based Access Control
- Time of Day Restrictions
- Federation Transitive Trust/Authentication
- Module Review Account Management
- Security Controls Module Overview User with Multiple Accounts
- Shared Accounts Account Policy
- Management Group Policy
- Password Complexity
- Expiration Recovery
- Disablement Lockout
- Password History
- Password Reuse
- Password Length
- Basic Concepts of AWS IAM
- What is the AWS IAM?
- Managing Users
- Managing Groups
- Managing Permissions and Roles
- Customization and Reports
- Login and Customization
- Getting Credentials Reports
- Improving security on AWS IAM
- Creating Keys with AWS KMS
- Setup Account Password Policy
- Enabling MFA on Accounts and Root
- Best Practices Using AWS IAM
- Generic Account Prohibition
- Group Based Privileges
- User Assigned Privileges
- User Access Reviews
- Continuous Monitoring
Requirements
- No specific requirements but familiarity with AWS and cloud platforms would be helpful.
Audience
- IT professionals
- Security analysts
- Anyone seeking to gain knowledge and skills in identity and access management
14 Hours
Testimonials (1)
The tests I conducted during the practices we developed are something I don't typically engage with much, as I don't interact frequently with commands. However, I appreciated learning how these commands work and understanding their functionality. Although some of the commands required adjustments, investigating them on my own proved to be a valuable learning experience.
Wilmer Alfredo Del Maestro Capitan - Bafing S.A.C.
Course - Identity and Access Management (IAM)
Machine Translated