Course Outline
- Services Module Overview for Government
- RADIUS (Remote Authentication Dial-In User Service)
- TACACS+ (Terminal Access Controller Access-Control System Plus)
- Kerberos
- Secure LDAP
- SAML (Security Assertion Markup Language) with LDAP
- Module Review: Authentication Processes
- Authorization and Access Control: Differentiating Identification, Authentication, and Authorization
- Identification: Personal Identification Methods
- Verification: Card-Based Systems
- Username Authentication Mechanisms
- Tokens: Common Access Cards (CAC)
- Multifactor Authentication with Smart Cards
- Time-based One-Time Passwords (TOTP), Hash-based One-Time Passwords (HOTP), Challenge-Handshake Authentication Protocol (CHAP), and Password Authentication Protocol (PAP)
- Single Sign-On and Access Control Strategies
- Implicit Deny Principle
- Trusted Operating System: Authentication Factors
- Authorization Mechanisms
- Separation of Duties in Security Roles
- Access Control Lists (ACLs): Mandatory, Discretionary, and Role-Based/Rule-Based Access Control
- Time-of-Day Restrictions for Enhanced Security
- Federation: Transitive Trust and Authentication
- Module Review: Account Management Practices
- Security Controls Overview: Managing Users with Multiple Accounts
- Shared Accounts: Policy Considerations
- Group Policy Management for Enhanced Security
- Password Complexity Requirements
- Expiration and Recovery Procedures
- Disablement and Lockout Policies
- Password History Tracking
- Preventing Password Reuse
- Recommended Password Lengths
- Basic Concepts of AWS IAM (Identity and Access Management)
- Introduction to AWS IAM
- User Management in AWS IAM
- Group Management in AWS IAM
- Managing Permissions and Roles within AWS IAM
- Customization and Reporting Capabilities
- Login Customization for Enhanced Security
- Obtaining Credential Reports in AWS IAM
- Enhancing Security with AWS IAM Best Practices
- Creating and Managing Keys with AWS KMS (Key Management Service)
- Setting Up Account Password Policies
- Enabling Multi-Factor Authentication (MFA) for Accounts and Root Users
- Best Practices for Using AWS IAM in Government Settings
- Prohibiting Generic Accounts to Enhance Security
- Group-Based Privilege Management
- User-Assigned Privilege Management
- Conducting Regular User Access Reviews
- Implementing Continuous Monitoring for Enhanced Security
Requirements
- No specific prerequisites, but familiarity with AWS and cloud platforms is beneficial.
Audience for Government
- IT professionals
- Security analysts
- Any individuals aiming to enhance their knowledge and skills in identity and access management
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.