Course Overview
CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 5 - Identity and Access Management. Controlling who can access valuable resources can lead to proper confidentiality, integrity, and availability. A CISSP must understand mechanisms and techniques to verify a subjects authenticity before authorizing access. They must be able to assure that only proper interactions have occurred and mitigate potential attacks.
Course Objectives
Physical and Logical Access to Assets, Identification and Authentication of People and Devices, Identity Management Implementation, Identity as a Service (IDaaS), Integrate Third-Party Identity Services, Implement and Manage Authorization Mechanisms, Prevent or Mitigate Access Control Attacks, Identity and Access Provisioning Lifecycle
Who Should Attend?
Anyone who wants to gain more knowledge with: Understanding Information Security Concepts in Domain 5 - Identity and Access Management
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Physical and Logical Access to Assets
2 - Identification and Authentication of People and Devices
3 - Identity Management Implementation
4 - Identity as a Service (IDaaS)
5 - Integrate Third-Party Identity Services
6 - Implement and Manage Authorization Mechanisms
7 - Prevent or Mitigate Access Control Attacks
8 - Identity and Access Provisioning Lifecycle