Course Outline

  • Services Module Overview for Government
  • RADIUS (Remote Authentication Dial-In User Service)
  • TACACS+ (Terminal Access Controller Access-Control System Plus)
  • Kerberos
  • Secure LDAP
  • SAML (Security Assertion Markup Language) with LDAP
  • Module Review: Authentication Processes
  • Authorization and Access Control: Differentiating Identification, Authentication, and Authorization
  • Identification: Personal Identification Methods
  • Verification: Card-Based Systems
  • Username Authentication Mechanisms
  • Tokens: Common Access Cards (CAC)
  • Multifactor Authentication with Smart Cards
  • Time-based One-Time Passwords (TOTP), Hash-based One-Time Passwords (HOTP), Challenge-Handshake Authentication Protocol (CHAP), and Password Authentication Protocol (PAP)
  • Single Sign-On and Access Control Strategies
  • Implicit Deny Principle
  • Trusted Operating System: Authentication Factors
  • Authorization Mechanisms
  • Separation of Duties in Security Roles
  • Access Control Lists (ACLs): Mandatory, Discretionary, and Role-Based/Rule-Based Access Control
  • Time-of-Day Restrictions for Enhanced Security
  • Federation: Transitive Trust and Authentication
  • Module Review: Account Management Practices
  • Security Controls Overview: Managing Users with Multiple Accounts
  • Shared Accounts: Policy Considerations
  • Group Policy Management for Enhanced Security
  • Password Complexity Requirements
  • Expiration and Recovery Procedures
  • Disablement and Lockout Policies
  • Password History Tracking
  • Preventing Password Reuse
  • Recommended Password Lengths
  • Basic Concepts of AWS IAM (Identity and Access Management)
  • Introduction to AWS IAM
  • User Management in AWS IAM
  • Group Management in AWS IAM
  • Managing Permissions and Roles within AWS IAM
  • Customization and Reporting Capabilities
  • Login Customization for Enhanced Security
  • Obtaining Credential Reports in AWS IAM
  • Enhancing Security with AWS IAM Best Practices
  • Creating and Managing Keys with AWS KMS (Key Management Service)
  • Setting Up Account Password Policies
  • Enabling Multi-Factor Authentication (MFA) for Accounts and Root Users
  • Best Practices for Using AWS IAM in Government Settings
  • Prohibiting Generic Accounts to Enhance Security
  • Group-Based Privilege Management
  • User-Assigned Privilege Management
  • Conducting Regular User Access Reviews
  • Implementing Continuous Monitoring for Enhanced Security

Requirements

  • No specific prerequisites, but familiarity with AWS and cloud platforms is beneficial.

Audience for Government

  • IT professionals
  • Security analysts
  • Any individuals aiming to enhance their knowledge and skills in identity and access management
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories