Language:
English
Pages:
1 online resource (1 video file (1 hr., 34 min.))
,
sound, color.
Edition:
[First edition].
DDC:
005.8
Keywords:
Computer networks Security measures
;
Computer security
;
Computers Access control
;
Instructional films
;
Nonfiction films
;
Internet videos
Abstract:
In cybersecurity, the "fortress and moat" analogy served well only when users worked within office walls on office machines and had to go through physical access controls and a firewall perimeter to access the network. Today's organizations want to enable their workforce to work from anywhere, on any device, and at any time. That means the IT network perimeter is no longer a position of advantage. The adoption of cloud, the increasingly complex and varied threat landscape, remote workers, third-party vendors, and distributed offices are the kinds of challenges that can't be addressed by traditional perimeter defenses, such as a firewall with some form of intrusion prevention-detection (IDS/IPS) system. Securing information or data means wrapping security around user identity: in other words, identity is now the new perimeter and requires implementing an identity and access management capability. Join expert Harpreet Kohli to explore identity and access management (IAM) concepts and components, key challenges, and an action plan to build an IAM strategy and road map. If you want to better understand how IAM strategy, technology, and processes work together to build an IAM capability in an organization or are preparing for the CISSP or CISM certification exams, this course is for you.What you'll learn and how you can apply it By the end of this course, you'll understand: The problems IAM will solve The components of IAM and how they work together IAM use cases An action plan to build or update your IAM strategy and road map And you'll be able to: Assess the current state of IAM in your organization Identify the deficiencies and associated risks Establish criteria for a successful IAM implementationThis course is for you because... You're an IT professional, cybersecurity professional, or technical or management decision maker who wants to learn about IAM. You're a technology and business consultant acting as a liaison between technology and business units. You're a project, team, or department leader who requires the knowledge to collaborate with cybersecurity teams. You're a manager, administrator, or executive who wants to understand cybersecurity security responsibilities and best practices. Prerequisites A basic understanding of IT, security, and business concerns Recommended preparation: Read "Introduction" (chapter in Identity and Access Management) Recommended follow-up: Finish Identity and Access Management (book) Take CISSP Bootcamp (live online training course with Dean Bushmiller).
Note:
Online resource; title from title details screen (O'Reilly, viewed December 12, 2022)
Permalink