CISSP Certification Training: Domain 5

Video description

In this CISSP Certification Training: Domain 5 training course, expert author David R. Miller will teach you everything you need to know to prepare for and pass domain 5 of the Certified Information Systems Security Professional Certification covering identity and access management. This course is designed for anyone who is looking to prepare for the new CISSP certification exam.

You will start by learning about identification and authentication, including password management, attacks on passwords, and biometrics. From there, David will teach you about single sign on and federated identity management. Finally, this video tutorial also covers authorization, including access control types, access control models, and controlling remote access.

Once you have completed this computer based training course, you will have learned everything you need to know to successfully complete the Identity and Access Management domain of the CISSP certification exam.

Publisher resources

View/Submit Errata

Table of contents

  1. Identity And Access Management
    1. CISSP 2018 Domain 5 Update: Identity and Access Management (IAM) Part 1
    2. CISSP 2018 Domain 5 Update: Identity and Access Management (IAM) Part 2
    3. About The Instructor
  2. Introduction And Key Terms
    1. Key Terms - Part 1
    2. Key Terms - Part 2
  3. Identification And Authentication
    1. Provisioning - Part 1
    2. Provisioning - Part 2
    3. Provisioning - Part 3
    4. Identification And Authentication Mechanisms
    5. Something You Know - Part 1
    6. Something You Know - Part 2
    7. Something You Know - Part 3
    8. Password Management
    9. Attacks On Passwords - Part 1
    10. Attacks On Passwords - Part 2
    11. Authentication Protocols
    12. Something You Have
    13. Memory Card Smart Card
    14. Token Devices
    15. Challenge Response Token Devices
    16. X.509 Digital Certificates
    17. Something You Are
    18. Biometrics - Part 1
    19. Biometrics - Part 2
    20. Errors In Biometrics
    21. Multifactor And Mutual Authentication
  4. Single Sign-On And Federated Identity Management
    1. SSO And Federated Identity Management
    2. X.500 Directory Services - Part 1
    3. X.500 Directory Services - Part 2
    4. Kerberos - Part 1
    5. Kerberos - Part 2
    6. Kerberos - Part 3
    7. Sesame
    8. Federated Identity Management - X.500
    9. Federated Identity Management - SAML, OpenID, And IDaaS
  5. Authorization
    1. Authorization And Access Controls
    2. Access Control Types - Part 1
    3. Access Control Types - Part 2
    4. Access Control Types - Part 3
    5. Obscurity Layers Authorization Lifecycle
    6. Access Control Models - MAC - Part 1
    7. Access Control Models - MAC - Part 2
    8. Access Control Models - DAC - Part 1
    9. Access Control Models - DAC - Part 2
    10. Access Control Matrix
    11. Access Control Models - RBAC
    12. Access Control Models - Rule Based
    13. Centralized And Decentralized Access Control Models - Part 1
    14. Centralized And Decentralized Access Control Models - Part 2
    15. Distributed Hybrid Access Control Models
    16. Controlling Remote Access - Radius - Part 1
    17. Controlling Remote Access - Radius - Part 2
    18. Controlling Remote Access - TACACS Diameter
    19. Credential Management Content Context
    20. Additional Access Controls
    21. Attacks On Authorization
  6. Conclusion
    1. Wrap Up

Product information

  • Title: CISSP Certification Training: Domain 5
  • Author(s): David R. Miller
  • Release date: March 2016
  • Publisher(s): Infinite Skills
  • ISBN: 9781771376044