User Tools

Site Tools


products:ict:security:cissp:cissp_course_outline

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
products:ict:security:cissp:cissp_course_outline [2024/03/30 16:14] – [3. Security Architecture and Engineering:] wikiadminproducts:ict:security:cissp:cissp_course_outline [2024/03/30 20:20] (current) – [5. Identity and Access Management (IAM):] wikiadmin
Line 83: Line 83:
  
  
-Frameworks for designing and implementing security controls (e.g., COBIT, ITIL, ISO 27001/27002).+[[products:ict:security:frameworks_for_designing_and_implementing_security_controls_cobit_itil_iso_27001_27002|Frameworks for designing and implementing security controls (e.g., COBIT, ITIL, ISO 27001/27002).]]
  
 3.2. **Security Engineering Principles:** 3.2. **Security Engineering Principles:**
Line 125: Line 125:
  
 4.2. **Secure Communication Channels:** 4.2. **Secure Communication Channels:**
-   Secure communication protocols (e.g., SSL/TLS, HTTPS, SSH) and their role in ensuring confidentiality, integrity, and authenticity of data in transit. + 
-   - Implementing secure email protocols (e.g., S/MIME, PGP) for secure email communication. +[[products:ict:security:secure_communication_protocols|Secure communication protocols (e.g., SSL/TLS, HTTPS, SSH) and their role in ensuring confidentiality, integrity, and authenticity of data in transit.]] 
-   - Secure file transfer protocols (e.g., SFTP, FTPS) for secure file transfers. + 
-   - Principles of secure instant messaging and collaboration tools.+[[products:ict:security:implementing_secure_email_protocols|Implementing secure email protocols (e.g., S/MIME, PGP) for secure email communication.]] 
 + 
 + 
 +[[products:ict:security:secure_file_transfer_protocols|Secure file transfer protocols (e.g., SFTP, FTPS) for secure file transfers.]] 
 + 
 +[[products:ict:security:principles_of_secure_instant_messaging_and_collaboration_tools|Principles of secure instant messaging and collaboration tools.]]
  
 4.3. **Network Security Protocols:** 4.3. **Network Security Protocols:**
Line 167: Line 172:
 3. **Authentication and Authorization Mechanisms:** 3. **Authentication and Authorization Mechanisms:**
    - Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are).    - Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are).
-   Authentication methods (e.g., passwords, biometrics, tokens, multi-factor authentication).+ 
 +[[products:ict:security:authentication_fundamentals|Authentication methods (e.g., passwords, biometrics, tokens, multi-factor authentication).]] 
    - Single-factor vs. multi-factor authentication.    - Single-factor vs. multi-factor authentication.
    - Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect).    - Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect).
Line 173: Line 180:
  
 4. **Identity Federation and Single Sign-On:** 4. **Identity Federation and Single Sign-On:**
-   Understanding identity federation concepts and architectures. + 
-   - Single sign-on (SSO) principles and benefits. +[[products:ict:security:understanding_identity_federation_concepts_and_architectures|Understanding identity federation concepts and architectures.]] 
-   - Federation standards and protocols (e.g., SAML, OAuth, OpenID Connect). + 
-   - Implementing SSO solutions across multiple domains and applications. +[[products:ict:security:implementing_sso_solutions_across_multiple_domains_and_applications|Single sign-on (SSO) principles and benefits.]] 
-   - Federated identity management considerations for cloud-based services and hybrid environments.+ 
 +[[products:ict:security:federation_standards_and_protocols|Federation standards and protocols (e.g., SAML, OAuth, OpenID Connect).]] 
 + 
 +[[products:ict:security:implementing_sso_solutions_across_multiple_domains_and_applications|Implementing SSO solutions across multiple domains and applications.]] 
 + 
 +[[products:ict:security:federated_identity_management_considerations_for_cloud_based_services_and_hybrid_environments|Federated identity management considerations for cloud-based services and hybrid environments.]]
  
 This section covers key concepts and practices related to identity and access management, including access control fundamentals, identity management, authentication mechanisms, and federation technologies. It provides candidates with the knowledge and skills needed to design, implement, and manage robust IAM solutions to ensure secure access to resources and applications while maintaining compliance with organizational policies and regulatory requirements. This section covers key concepts and practices related to identity and access management, including access control fundamentals, identity management, authentication mechanisms, and federation technologies. It provides candidates with the knowledge and skills needed to design, implement, and manage robust IAM solutions to ensure secure access to resources and applications while maintaining compliance with organizational policies and regulatory requirements.
products/ict/security/cissp/cissp_course_outline.1711797298.txt.gz · Last modified: 2024/03/30 16:14 by wikiadmin