5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     CompTIA     CompTIA Cloud+ Certification     CompTIA Cloud+ (CV0-003)
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management.
First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

Objectives

CompTIA Cloud+ (CV0-003): Cloud Identity & Access Management

  • discover the key concepts covered in this course
  • describe how to configure identity and access management (IAM) including identification, authorization, and privileged access management
  • describe how to use the Lightweight Directory Access Protocol (LDAP) to manage access to resources
  • describe how identity federation can be used to manage user identities
  • describe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers
  • describe how multi-factor authentication (MFA) can be used for access control
  • describe how single sign-on (SSO) can be used to reduce the need to sign on to multiple systems
  • describe how Public Key Infrastructure (PKI) is used to create, manage, distribute, use, store, and revoke digital certificates
  • describe how secret and key management can be used to centrally manage security keys
  • describe the components that can be used to perform incident response preparation
  • describe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysis
  • summarize the key concepts covered in this course