Government regulations and the convenience of federated identities have made identity management and access control...
Step 2 of 2:
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
a priority for many enterprises. This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Each lesson is comprised of a webcast, podcast, technical article and quiz -- all available on-demand for your convenience.
|Send the editor your feedback on this Security School|
|Learn how you can earn CPE credits from (ISC)²|
|Visit our other Security Schools|
|Visit our identity and access management resource center|
|Submit a question to our identity and access management expert|
|Download free security IT software|
|Identity and Access Management Security School Course Outline|
Instructor: Ben Rothke, CISSP
The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent. In this lesson, attendees will learn tactics for endpoint security, policies for controlling endpoints and where endpoint security technology is headed.
VPNs and remote access
Instructor: Lisa Phifer, VP, Core Competence Inc.
Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, attendees learn about the latest innovations in VPN technology, IPsec VPN identity and authentication options, and how to deploy a VPN that meets workforce needs without compromising security.
Instructor: Laura Hunter, Laura Hunter, CISSP, MCSE: Security, MCDBA, Microsoft MVP
Setting up new accounts and provisioning hardware are tedious tasks, and mistakes can lead to weak security. In this lesson, attendees will learn how to leverage directory services and policies to automate this task. They'll also learn how to utilize Active Directory to automate provisioning and how the provisioning market place is taking shape.
Building an identity and access management architecture
Instructor: Richard Mackey, ISACA, CISM
Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This lesson explores the essentials of identity and access management, from the role of directories to effectively establishing approval workflows. Attendees will also get tips for tackling the five key challenges in managing identities and effective access control strategies.
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker
When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors to decide which option best suits their needs. This lesson helps attendees understand the FFIEC's mandate, how to choose the right authentication option for diverse user communities and how to implement an authentication strategy.
Integrating security into the network
Instructor: Mike Rothman, President and Principal Analyst of Security Incite
Through both vendor consolidation and evolution, security capabilities are increasingly being woven into the network fabric. In this lesson, Mike Rothman, president and principal analyst of Security Incite, will help attendees understand the network/security evolution and how to harness this strategic trend to make better tactical decisions. They'll also learn how the roles and responsibilities of security practitioners must inevitably change and how network access control helps contribute to regulatory compliance efforts.
After you've completed this six-lesson course, take this final exam to assess your knowledge of identity and access management based on what you've learned in this school.