🔥CISSP Certification Training Course - www.simplilearn.com/cyber-security/cissp-certification-training?YaUxgfhHM&Comments&UA-cam 🔥MIT - Post Graduate Program in Cyber Security - www.simplilearn.com/pgp-cyber-security-certification-training-course?YaUxgfhHM&Comments&UA-cam 🔥Professional Certificate Program in Cybersecurity- Red Team (India Only) - www.simplilearn.com/vapt-vulnerability-assessment-penetration-testing-certification?YaUxgfhHM&Comments&UA-cam
You are welcome Teja :) If you are thinking of signing up for the course, please click on the link for more information: www.simplilearn.com/cyber-security/cissp-certification-training?Cissp-identity-accessmanagement-8rYaUxgfhHM&SC&
🔥CISSP Certification Training Course - www.simplilearn.com/cyber-security/cissp-certification-training?YaUxgfhHM&Comments&UA-cam
🔥MIT - Post Graduate Program in Cyber Security - www.simplilearn.com/pgp-cyber-security-certification-training-course?YaUxgfhHM&Comments&UA-cam
🔥Professional Certificate Program in Cybersecurity- Red Team (India Only) - www.simplilearn.com/vapt-vulnerability-assessment-penetration-testing-certification?YaUxgfhHM&Comments&UA-cam
0:06 Introduction to access
0:11 Objectives
0:37 Scenario
1:37 Concept of physical and logical access
3:04 Benefits
4:49 Access, Subjects, Objects and access control
6:01
6:46
8:14
8:42 Identity and Access Provisioning Lifecycle***
8:45 Identity and mgmt - Provisioning, Review, Revocation
10:05 Identification, Authentication and Authorization
10:54 Identification Guidelines
11:49 Verifying Identification Information
13:29 Strong Authentication
14:50 Biometrics
20:47 Password
23:40 Token
25:39 Memory and smart card
29:25 Access Criteria
29:47 Access Criteria Cycle
31:27 Authorization Concepts
33:48 Identity Management Implementation
34:07
36:16 Directory Management
38:56 Accounts Management
40:10 Profile Management
40:58 Web Access
41:26 Single Sign On (SSO)
43:19 SSO Technologies
44:13 Kerberos
49:25 Business Scenario 1
53:19 Business Scenario 2
53:43 Access Control Models
56:30 Business Scenario 3
1:02:25 Radius
1:04:11 TACACS
1:05:09 Diameter
1:06:05 Accountability
1:07:46 Access control monitoring
1:08:25 Session management
1:09:21 Registration and proof of identity
1:10:00 Credential Management
1:10:49
Thanks for mentioning the timestamps!
Very Good Knowledgeable Session
Thanks and welcome
It's nice that this video is edited to eliminate voids, but some of the transitions overlap and make it hard to understand.
Hi Jon
Thanks for the feedback. We shall share your concerns with the concerned department.
very useful thanks
You are welcome
can you show some live examples or tools which iam admin uses?
As it is CISSP exam, I'm sorry, we don't have access to tools. Only the people who took up the course have access to the tools
Thanks for the video!
covered the entire module briefly.
You are welcome Teja :) If you are thinking of signing up for the course, please click on the link for more information: www.simplilearn.com/cyber-security/cissp-certification-training?Cissp-identity-accessmanagement-8rYaUxgfhHM&SC&