O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Certification Training: Domain 5

Video Description

In this CISSP Certification Training: Domain 5 training course, expert author David R. Miller will teach you everything you need to know to prepare for and pass domain 5 of the Certified Information Systems Security Professional Certification covering identity and access management. This course is designed for anyone who is looking to prepare for the new CISSP certification exam.

You will start by learning about identification and authentication, including password management, attacks on passwords, and biometrics. From there, David will teach you about single sign on and federated identity management. Finally, this video tutorial also covers authorization, including access control types, access control models, and controlling remote access.

Once you have completed this computer based training course, you will have learned everything you need to know to successfully complete the Identity and Access Management domain of the CISSP certification exam.

Table of Contents

  1. Identity And Access Management
    1. CISSP 2018 Domain 5 Update: Identity and Access Management (IAM) Part 1 00:12:42
    2. CISSP 2018 Domain 5 Update: Identity and Access Management (IAM) Part 2 00:13:12
    3. About The Instructor 00:03:34
  2. Introduction And Key Terms
    1. Key Terms - Part 1 00:07:12
    2. Key Terms - Part 2 00:07:01
  3. Identification And Authentication
    1. Provisioning - Part 1 00:08:13
    2. Provisioning - Part 2 00:07:02
    3. Provisioning - Part 3 00:09:39
    4. Identification And Authentication Mechanisms 00:09:43
    5. Something You Know - Part 1 00:07:45
    6. Something You Know - Part 2 00:08:16
    7. Something You Know - Part 3 00:08:04
    8. Password Management 00:08:27
    9. Attacks On Passwords - Part 1 00:10:02
    10. Attacks On Passwords - Part 2 00:08:05
    11. Authentication Protocols 00:07:49
    12. Something You Have 00:07:04
    13. Memory Card Smart Card 00:06:39
    14. Token Devices 00:06:55
    15. Challenge Response Token Devices 00:03:33
    16. X.509 Digital Certificates 00:05:50
    17. Something You Are 00:06:28
    18. Biometrics - Part 1 00:07:50
    19. Biometrics - Part 2 00:06:13
    20. Errors In Biometrics 00:06:11
    21. Multifactor And Mutual Authentication 00:06:21
  4. Single Sign-On And Federated Identity Management
    1. SSO And Federated Identity Management 00:08:00
    2. X.500 Directory Services - Part 1 00:06:42
    3. X.500 Directory Services - Part 2 00:07:41
    4. Kerberos - Part 1 00:08:11
    5. Kerberos - Part 2 00:09:42
    6. Kerberos - Part 3 00:06:31
    7. Sesame 00:06:23
    8. Federated Identity Management - X.500 00:09:09
    9. Federated Identity Management - SAML, OpenID, And IDaaS 00:09:18
  5. Authorization
    1. Authorization And Access Controls 00:10:59
    2. Access Control Types - Part 1 00:05:27
    3. Access Control Types - Part 2 00:10:29
    4. Access Control Types - Part 3 00:08:11
    5. Obscurity Layers Authorization Lifecycle 00:07:51
    6. Access Control Models - MAC - Part 1 00:09:33
    7. Access Control Models - MAC - Part 2 00:06:02
    8. Access Control Models - DAC - Part 1 00:08:31
    9. Access Control Models - DAC - Part 2 00:08:30
    10. Access Control Matrix 00:04:47
    11. Access Control Models - RBAC 00:07:37
    12. Access Control Models - Rule Based 00:06:53
    13. Centralized And Decentralized Access Control Models - Part 1 00:08:46
    14. Centralized And Decentralized Access Control Models - Part 2 00:02:34
    15. Distributed Hybrid Access Control Models 00:03:29
    16. Controlling Remote Access - Radius - Part 1 00:08:15
    17. Controlling Remote Access - Radius - Part 2 00:12:06
    18. Controlling Remote Access - TACACS Diameter 00:07:53
    19. Credential Management Content Context 00:08:34
    20. Additional Access Controls 00:08:57
    21. Attacks On Authorization 00:03:32
  6. Conclusion
    1. Wrap Up 00:05:18