CISM 2020: Identity & Access Management
Information security managers must consider the security risks and potential impact of user access to resources. In this course you;ll explore how to manage and assign user authentication and authorization to use resources for various cloud and local services.
You;ll start by distinguishing between authentication and authorization. Next you;ll assign file system permissions in Windows and Linux. You;ll then practice assigning permissions policies to AWS users. Lastly you;ll enable multifactor authentication and single sign-on for AWS users.
By the end of this course you;ll be able to create and manage Microsoft AD Linux and AWS users and groups and set up various types of permissions for them.
This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.