Identity and account management Course

1 hour, 30 minutes


Identification, authentication, and authorization

Video - 00:08:00

Authorization to access resources occurs after the successful proving of one’s identity through authentication.
Enabling multifactor authentication

Video - 00:05:00

Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have.

Video - 00:05:00

Authorization relates to resource permissions granted to a security principal such as a user or device.

Video - 00:05:00

The 3 As, authentication, authorization, and accounting/auditing, play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows.
Authentication methods

Video - 00:14:00

Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes, certificate-based authentication and SSH public key authentication.
Access control schemes

Video - 00:07:00

Controlling resource access begins with policies that govern credential management. Permissions can be configured through attribute-based access control (ABAC), role-based access control (RBAC), discretionary access control (DAC), and for high security environments, mandatory access control (MAC).
Account management

Video - 00:13:00

Accountability for resource access requires that people use their own unique user accounts, and apply the principle of least privilege, ideally through group-assigned permissions. Account policies can determine conditions, such as a user's location, that allow or deny resource access.
Network authentication

Video - 00:09:00

Older network authentication protocols such as password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and extensible authentication protocol (EAP). Variations of the RADIUS authentication protocol are still used to authenticate users and devices to networks.
Identity management systems

Video - 00:06:00

How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO).
Chapter 4 exam question review

Video - 00:12:00

There are a variety of ways in which user authentication can be implemented prior to allowing the user access to the Internet. This question presents a scenario that requires a user to sign off on the terms of agreement before gaining Internet access.
Creating Linux users and groups lab

Video - 00:06:00

User and group management in Linux can be performed at the command line. This demo makes use of the useradd and groupadd commands to create authentication identities.
Chapter 4 Ask Me Anything (AMA)

Video - 00:01:00

Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust