Identify and Access Management: Course Overview | ALC Training News
- No comments
No system – however secure in its internal design – can be considered to operate safely unless an authentication
front-end is implemented. Thus this workshop examines the components of the design of IAM (Identity and Access
Management) systems. As such it incorporates design and configuration of Active Directory (including
Kerberos), RADIUS, and the RSA token authentication engine as well as the use of multi-factor authentication
Firstly the access policy is designed and this is the implemented in the Active Directory Server, Following this,
an authentication front end is added (RSA engine in this workshop). This involves the construction of a network
of client and back end servers (Domain Controller and Authentication Engine) along with policy implementation
testing as well as configuration of the security functionality.
- ALC’s Cyber Scholarship Program – A Community Support Initiative
- ASD scraps Cloud Security Certification Program – Now What?
- Cybersecurity in your pocket: The essentials of mobile malware
- Where to Start with Digital Transformation?
- InfoSec Skilled Workforce Shortfall – Reality?
- What is the Office 365 Security & Compliance Centre?