Course Outline
- Overview of Services Module for Government
- RADIUS for Government
- TACACS for Government
- Kerberos for Government
- Secure LDAP for Government
- SAML with LDAP for Government
- Review of Authentication Module for Government
- Review of Authorization and Access Control for Government: Identification, Authentication, and Authorization
- Personal Identification in Government
- Verification Card for Government
- Username Authentication for Government
- Common Access Tokens for Government
- Multifactor Authentication with Cards for Government
- Time-based One-time Password (TOTP), Hash-based One-time Password (HOTP), Challenge-Handshake Authentication Protocol (CHAP), and Password Authentication Protocol (PAP) for Government
- Single Sign-on and Access Control for Government
- Implicit Deny in Government Systems
- Trusted Operating System Authentication Factors for Government
- Authorization for Government
- Separation of Duties for Government
- Access Control Lists (ACLs), Mandatory Access Control, and Discretionary Access Control for Government
- Role-Based and Rule-Based Access Control for Government
- Time of Day Restrictions for Government
- Federation: Transitive Trust and Authentication for Government
- Review of Account Management Module for Government
- Security Controls Overview for Government Users with Multiple Accounts
- Shared Accounts and Account Policies for Government
- Group Policy Management for Government
- Password Complexity Requirements for Government
- Password Expiration and Recovery for Government
- Account Disablement and Lockout for Government
- Password History Tracking for Government
- Prohibiting Password Reuse for Government
- Password Length Requirements for Government
- Basic Concepts of AWS IAM for Government
- What is AWS IAM for Government?
- Managing Users in AWS IAM for Government
- Managing Groups in AWS IAM for Government
- Managing Permissions and Roles in AWS IAM for Government
- Customization and Reporting in AWS IAM for Government
- Login and Customization in AWS IAM for Government
- Obtaining Credentials Reports in AWS IAM for Government
- Enhancing Security on AWS IAM for Government
- Creating Keys with AWS KMS for Government
- Setting Up Account Password Policy for Government
- Enabling Multi-Factor Authentication (MFA) on Accounts and Root for Government
- Best Practices Using AWS IAM for Government
- Prohibition of Generic Accounts in AWS IAM for Government
- Group-Based Privileges Management in AWS IAM for Government
- User-Assigned Privileges in AWS IAM for Government
- Regular User Access Reviews in AWS IAM for Government
- Continuous Monitoring of AWS IAM for Government
Requirements
- While there are no specific requirements, familiarity with AWS and cloud platforms would be beneficial.
Audience
- IT professionals for government
- Security analysts
- Individuals interested in enhancing their knowledge and skills in identity and access management
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.