From the course: Building and Auditing a Cybersecurity Program
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Access management to control unauthorized access
From the course: Building and Auditing a Cybersecurity Program
Access management to control unauthorized access
- [Instructor] Access management is a framework of policies, processes and technologies that enable an organizations to manage digital identities and control user access to an organization's information. Access management is a cornerstone in every robust cybersecurity program. Access management ensures the right individuals get access to the right resources. Access management is also referred to as identity and access management, IAM. Identity and access management consists of four core control objectives. Number one, identification. Who are you? Identifiers also called IDs may be created for people, groups and system defined processes. Identification usually consists of your name, username, ID, number, or employee number. Authentication. Can you prove your identity. Authentication factors are often defined as something you know like a password, something you have like a digital token or something you are…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Establish data security management practices to protect data5m 3s
-
(Locked)
Encryption to provide confidentiality of data5m 58s
-
(Locked)
Access management to control unauthorized access4m 37s
-
(Locked)
Vulnerability management to mitigate security weaknesses4m 50s
-
(Locked)
Secure configuration process to minimize vulnerabilities3m 59s
-
(Locked)
-
-
-
-
-