Course Outline

  • Overview of Services Module for Government
  • RADIUS for Government
  • TACACS for Government
  • Kerberos for Government
  • Secure LDAP for Government
  • SAML with LDAP for Government
  • Review of Authentication Module for Government
  • Review of Authorization and Access Control for Government: Identification, Authentication, and Authorization
  • Personal Identification in Government
  • Verification Card for Government
  • Username Authentication for Government
  • Common Access Tokens for Government
  • Multifactor Authentication with Cards for Government
  • Time-based One-time Password (TOTP), Hash-based One-time Password (HOTP), Challenge-Handshake Authentication Protocol (CHAP), and Password Authentication Protocol (PAP) for Government
  • Single Sign-on and Access Control for Government
  • Implicit Deny in Government Systems
  • Trusted Operating System Authentication Factors for Government
  • Authorization for Government
  • Separation of Duties for Government
  • Access Control Lists (ACLs), Mandatory Access Control, and Discretionary Access Control for Government
  • Role-Based and Rule-Based Access Control for Government
  • Time of Day Restrictions for Government
  • Federation: Transitive Trust and Authentication for Government
  • Review of Account Management Module for Government
  • Security Controls Overview for Government Users with Multiple Accounts
  • Shared Accounts and Account Policies for Government
  • Group Policy Management for Government
  • Password Complexity Requirements for Government
  • Password Expiration and Recovery for Government
  • Account Disablement and Lockout for Government
  • Password History Tracking for Government
  • Prohibiting Password Reuse for Government
  • Password Length Requirements for Government
  • Basic Concepts of AWS IAM for Government
  • What is AWS IAM for Government?
  • Managing Users in AWS IAM for Government
  • Managing Groups in AWS IAM for Government
  • Managing Permissions and Roles in AWS IAM for Government
  • Customization and Reporting in AWS IAM for Government
  • Login and Customization in AWS IAM for Government
  • Obtaining Credentials Reports in AWS IAM for Government
  • Enhancing Security on AWS IAM for Government
  • Creating Keys with AWS KMS for Government
  • Setting Up Account Password Policy for Government
  • Enabling Multi-Factor Authentication (MFA) on Accounts and Root for Government
  • Best Practices Using AWS IAM for Government
  • Prohibition of Generic Accounts in AWS IAM for Government
  • Group-Based Privileges Management in AWS IAM for Government
  • User-Assigned Privileges in AWS IAM for Government
  • Regular User Access Reviews in AWS IAM for Government
  • Continuous Monitoring of AWS IAM for Government

Requirements

  • While there are no specific requirements, familiarity with AWS and cloud platforms would be beneficial.

Audience

  • IT professionals for government
  • Security analysts
  • Individuals interested in enhancing their knowledge and skills in identity and access management
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories