9 Power BI Jobs: Positions That Rely on Data Visualization
May 30, 2024
Article
Cultivate your career with expert-led programs, job-ready certificates, and 10,000 ways to grow. All for $25/month, billed annually. Save now
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
Intermediate level
Designed for IT pros, security managers, and admins seeking CISSP or enhancing IAM expertise. Basic security and networking knowledge required.
Recommended experience
Intermediate level
Designed for IT pros, security managers, and admins seeking CISSP or enhancing IAM expertise. Basic security and networking knowledge required.
Manage authentication, authorization, and accounting processes within IAM systems to ensure secure access.
Utilize protocols like OAuth, SAML, and RADIUS to enhance authentication security and prevent breaches.
Perform identity lifecycle management tasks, including provisioning, deprovisioning, and access reviews, to maintain secure identities.
Apply Federated Identity Management (FIM) to enable secure cross-domain access for users and systems.
Add to your LinkedIn profile
October 2024
1 assignment
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
In this detailed course on Identity and Access Management (IAM), you will explore the full spectrum of identity controls and management practices essential for today’s IT environments. Beginning with an overview of physical and logical access control methods, you’ll learn how to secure key organizational assets. The course progresses into the types of access controls, focusing on role-based and rule-based models, as well as advanced access control mechanisms like Attribute-Based Access Control (ABAC) and Risk-Based Access Control.
Key IAM concepts like authentication, authorization, and accounting (AAA) are thoroughly discussed, emphasizing their importance in modern security architectures. You'll also learn how to manage sessions, perform identity registration, and implement Federated Identity Management (FIM) for cross-domain environments. The course also covers credential management techniques like password vaults, Single Sign-On (SSO), and Just-in-Time access, ensuring you can manage identities securely and efficiently. By the end of the course, you will be equipped to handle identity lifecycle processes such as provisioning, deprovisioning, account access reviews, and role definitions. Additionally, protocols like OAuth, OpenID, SAML, Kerberos, RADIUS, and TACACS+ are explained in depth, giving you a strong understanding of authentication systems. This course prepares you not only for the CISSP exam but also for the real-world challenges of managing identity and access in complex IT environments. This course is ideal for IT professionals, security managers, and network administrators preparing for CISSP certification or seeking to strengthen their expertise in Identity and Access Management (IAM). A basic understanding of information security and networking is recommended.
This module covers the fundamental concepts of controlling both physical and logical access in an organization, with a focus on different types of access controls and identity lifecycle management. Learners will explore how to manage user groups and roles, implement authentication, authorization, and accounting (AAA), and ensure secure session management. Additionally, key concepts around identity registration and proofing, as well as Federated Identity Management (FIM), will be covered. By the end of this module, learners will have a strong grasp of essential IAM components and how to control access to critical assets.
9 videos2 readings
This module focuses on advanced IAM concepts, including various access control models, provisioning and deprovisioning processes, and protocols for secure authentication. Learners will examine models like Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Attribute-Based Access Control (ABAC). The module will also cover key IAM protocols such as OAuth, OpenID, SAML, and Kerberos, which are vital for secure authentication and authorization across networks. Additionally, it will explore methods for access policy enforcement and account access review in complex IT environments.
11 videos1 reading1 assignment
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Course
ISC2
Course
Whizlabs
Course
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Financial aid available,
Learn on your own time from top universities and businesses.
Already on Coursera?
Having trouble logging in? Learner help center
This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.