CISM 2020: Identity & Access Management

placeholder

“Information security managers must consider the security risks and potential impact of user access to resources. In this course you ll explore how to manage and assign user authentication and authorization to use resources for various cloud and local services.
You ll start by distinguishing between authentication and authorization. Next you ll assign file system permissions in Windows and Linux. You ll then practice assigning permissions policies to AWS users. Lastly you ll enable multifactor authentication and single sign-on for AWS users.
By the end of this course you ll be able to create and manage Microsoft AD Linux and AWS users and groups and set up various types of permissions for them.
This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.”