English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 6h 48m | 765 MB
The course provides network professionals with a comprehensive exploration of identity and access management. Instructor Liam Cleary covers the fundamentals of IAM, including authentication mechanisms, authorization, access control techniques, and the intricacies of account management and identity federation. Liam also focuses on implementing IAM in cloud environments and strategies for monitoring and reporting to ensure robust security.
Advanced topics such as security protocols, encryption, and privileged access management (PAM) are also covered, along with practical aspects of integrating IAM with network infrastructure and automating IAM tasks using tools like PowerShell and Python.
Whether you want to deepen your existing knowledge or branch out into new areas of network security, this course combines theory with practical application, preparing you to manage identities and secure access effectively in any network environment.
Table of Contents
Introduction
1 Complete guide to IAM for network engineers
Introduction to Identity and Access Management in Networking
2 Overview of IAM in networking
3 Key components of IAM in network security
4 Setting up basic IAM roles and policies on Windows Server
5 IAM framework overview
6 Basic IAM configuration techniques
Authentication Mechanisms in IAM
7 Authentication protocols
8 Understanding multifactor authentication (MFA)
9 Implementing MFA on a Linux server
10 Configuring MFA for remote access to a Windows environment
11 Best practices in network authentication
Authorization and Access Control
12 Access control models and implementation
13 Role-based access control (RBAC) explained
14 Implementing RBAC in a Windows Server environment
15 Configuring RBAC on a Linux server
16 Setting up ACL on Linux for file-level security
17 Advanced access control techniques
Account Management and Identity Federation
18 Account lifecycle management overview
19 Introduction to identity federation
20 Identity federation in Active Directory
21 Configuring Azure AD for SSO with SaaS applications
22 Google Cloud Identity-Aware Proxy for application access
IAM in Cloud Environments
23 IAM features in AWS
24 IAM features in Azure
25 IAM features in GCP
26 Configuring IAM roles and policies in AWS
27 Setting up Azure AD and managing IAM in Azure
28 Implementing service accounts and roles in GCP
Monitoring and Reporting in IAM
29 IAM monitoring tools and techniques
30 Setting up audit trails in IAM
31 Setting up logging in Azure AD
32 Compliance checks and reporting in GCP
Advanced Security Protocols and Encryption in IAM
33 Overview of security protocols in IAM
34 Implementing encryption in IAM
35 Configuring SSLTLS on Windows Server
36 Secure SSH keys within a Linux server
37 Advanced encryption and key management in Linux
38 Security best practices in IAM
Integrating IAM with Network Infrastructure
39 IAM integration with networking devices
40 Network access control (NAC) and IAM
41 IAM for secure remote access
42 IAM policy implementation in network devices
43 Managing network device credentials
Automation in IAM
44 Introduction to IAM automation
45 Tools and scripts for IAM automation
46 Automating user accounts using PowerShell in Windows AD
47 Python scripts for automated IAM tasks in Linux
48 Automated IAM report generation using PowerShell and Python
49 Best practices in IAM automation
Privileged Access Management
50 Overview of PAM
51 Key concepts in privileged access management
52 Configuring PAM in cloud environments
53 Setting up PAM in Microsoft 365 and Azure
54 Future directions in PAM
Conclusion
55 Continuing your IAM journey
Resolve the captcha to access the links!