Video Description

This lesson covers identify and access management as well as access control. These concepts include the people, processes and systems that manage and enterprise system, all of which work in conjunction to ensure: • Entity identity verification • Correct access level relative to asset Participants also learn about the phases of identify and access management (IAM), centralized directory services and privileged user management. The purpose of authorization and access management is to control what users can and cannot do; they must be functional, operational and trusted and should be based on sound security principles.

Course Modules

ISC2 Certified Cloud Security Professional (CCSP)