5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Cloud Computing and Virtualization     Cloud and Virtualization Fundamentals     Cloud Computing Technology Fundamentals
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.

Objectives

Identity and Access Management

  • start the course
  • describe the basic concepts of identity and access management
  • list reasons for using identity federation
  • describe the operational areas of identity and access management
  • describe how cloud service providers can provide identity and access management

Federation and Access Control

  • describe the concepts associated with identity federation
  • describe the considerations for implementing identity federation in cloud services
  • describe the standards for identity federation
  • describe access control systems with single sign-on
  • list the benefits and risks of single sign-on

Identity as a Service

  • describe the identity as a service authentication infrastructure
  • describe the challenges in implementing Identity as a Service
  • describe methods for integrating Identity as a Service with other service models
  • list the pros and cons of the Identity as a Service provider

Cloud Presence

  • describe presence information and how it is used in cloud systems
  • describe the components of a presence system
  • describe the processes and tools associated with a presence system
  • describe the security considerations for presence systems

Cloud Privacy

  • describe the privacy concerns for cloud systems
  • describe the privacy policies and how they are implemented in cloud systems
  • describe the data life cycle in the context of cloud computing
  • describe the data security challenges in cloud computing
  • map the cloud security measures to the data life cycle stage to which they apply

Practice: Access Control and Privacy

  • describe the methods of controlling access to data stored on the cloud