Course Overview
            
            CISSP is the gold standard for security certifications.  It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization.  This course covers Domain 5 - Identity and Access Management. Controlling who can access valuable resources can lead to proper confidentiality, integrity, and availability. A CISSP must understand mechanisms and techniques to verify a subjects authenticity before authorizing access. They must be able to assure that only proper interactions have occurred and mitigate potential attacks.
            
            
            
            
                
Course Objectives
                
                    Physical and Logical Access to Assets, Identification and Authentication of People and Devices, Identity Management Implementation, Identity as a Service (IDaaS), Integrate Third-Party Identity Services, Implement and Manage Authorization Mechanisms, Prevent or Mitigate Access Control Attacks, Identity and Access Provisioning Lifecycle
                
                
            
            
            
                 
Who Should Attend?
                
                Anyone who wants to gain more knowledge with: Understanding Information Security Concepts in Domain 5 - Identity and Access Management
                
                
            
            
            
		
                    Course Prerequisites
                    There are no prerequisites for this course.
                
	 
             
            
            
                    
Agenda
                
                    1 - Physical and Logical Access to Assets
2 - Identification and Authentication of People and Devices
3 - Identity Management Implementation
4 - Identity as a Service (IDaaS)
5 - Integrate Third-Party Identity Services
6 - Implement and Manage Authorization Mechanisms
7 - Prevent or Mitigate Access Control Attacks
8 - Identity and Access Provisioning Lifecycle