User Tools

Site Tools


products:ict:security:cissp:cissp_course_outline

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
products:ict:security:cissp:cissp_course_outline [2024/03/30 16:20] – [4. Communication and Network Security:] wikiadminproducts:ict:security:cissp:cissp_course_outline [2024/03/30 20:20] (current) – [5. Identity and Access Management (IAM):] wikiadmin
Line 131: Line 131:
  
  
-   Secure file transfer protocols (e.g., SFTP, FTPS) for secure file transfers. +[[products:ict:security:secure_file_transfer_protocols|Secure file transfer protocols (e.g., SFTP, FTPS) for secure file transfers.]] 
-   - Principles of secure instant messaging and collaboration tools.+ 
 +[[products:ict:security:principles_of_secure_instant_messaging_and_collaboration_tools|Principles of secure instant messaging and collaboration tools.]]
  
 4.3. **Network Security Protocols:** 4.3. **Network Security Protocols:**
Line 171: Line 172:
 3. **Authentication and Authorization Mechanisms:** 3. **Authentication and Authorization Mechanisms:**
    - Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are).    - Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are).
-   Authentication methods (e.g., passwords, biometrics, tokens, multi-factor authentication).+ 
 +[[products:ict:security:authentication_fundamentals|Authentication methods (e.g., passwords, biometrics, tokens, multi-factor authentication).]] 
    - Single-factor vs. multi-factor authentication.    - Single-factor vs. multi-factor authentication.
    - Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect).    - Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect).
Line 177: Line 180:
  
 4. **Identity Federation and Single Sign-On:** 4. **Identity Federation and Single Sign-On:**
-   Understanding identity federation concepts and architectures. + 
-   - Single sign-on (SSO) principles and benefits. +[[products:ict:security:understanding_identity_federation_concepts_and_architectures|Understanding identity federation concepts and architectures.]] 
-   - Federation standards and protocols (e.g., SAML, OAuth, OpenID Connect). + 
-   - Implementing SSO solutions across multiple domains and applications. +[[products:ict:security:implementing_sso_solutions_across_multiple_domains_and_applications|Single sign-on (SSO) principles and benefits.]] 
-   - Federated identity management considerations for cloud-based services and hybrid environments.+ 
 +[[products:ict:security:federation_standards_and_protocols|Federation standards and protocols (e.g., SAML, OAuth, OpenID Connect).]] 
 + 
 +[[products:ict:security:implementing_sso_solutions_across_multiple_domains_and_applications|Implementing SSO solutions across multiple domains and applications.]] 
 + 
 +[[products:ict:security:federated_identity_management_considerations_for_cloud_based_services_and_hybrid_environments|Federated identity management considerations for cloud-based services and hybrid environments.]]
  
 This section covers key concepts and practices related to identity and access management, including access control fundamentals, identity management, authentication mechanisms, and federation technologies. It provides candidates with the knowledge and skills needed to design, implement, and manage robust IAM solutions to ensure secure access to resources and applications while maintaining compliance with organizational policies and regulatory requirements. This section covers key concepts and practices related to identity and access management, including access control fundamentals, identity management, authentication mechanisms, and federation technologies. It provides candidates with the knowledge and skills needed to design, implement, and manage robust IAM solutions to ensure secure access to resources and applications while maintaining compliance with organizational policies and regulatory requirements.
products/ict/security/cissp/cissp_course_outline.1711797622.txt.gz · Last modified: 2024/03/30 16:20 by wikiadmin