This course introduces these important information security concepts: identification, authentication, authorization and accounting (IAAA). It defines the terms, explains the IAAA process and provides an overview of the identity and access management concepts and services.
IdentificationDuration: 12:47
In this episode, Mike explains the issues of proving that you are who you are.
Authorization ConceptsDuration: 5:53
In this episode, Mike explores methods used for authorization, enabling clients to properly utilize resources.
Access Control ListDuration: 6:33
In this episode, Mike discusses how to govern access to resources.
Password SecurityDuration: 9:18
In this episode, Mike shows methods to keep passwords secure.
Linux File PermissionsDuration: 14:57
In this episode, Mike looks at how to control access to files in a Linux system.
Windows File PermissionsDuration: 13:43
In this episode, Mike looks at how to control access to files in a Windows system.
User Account ManagementDuration: 6:48
In this episode, Mike discusses the security of user accounts.
AAADuration: 8:08
In this episode, Mike explores two common methods used for AAA: RADIUS and TACACS+.
Authentication MethodsDuration: 9:55
In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP and more.
Single Sign-OnDuration: 10:14
In this episode, Mike describes how to log in to one computer and gain access to many.