Details for this torrent 

Lynda - CompTIA Security+ Exam Prep (SY0-401): Access Control an
Type:
Other > Other
Files:
24
Size:
220.71 MiB (231427353 Bytes)
Uploaded:
2015-12-18 12:48:51 GMT
By:
2boweb VIP
Seeders:
2
Leechers:
0
Comments
0  

Info Hash:
5743021AC3A086B4D18B18A35F3E5E15480B6973




(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management

This Course will be good to the Best for DL within 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive.

1h 15m Intermediate Dec 10, 2015  | Uploaded in Dec 18, 2015 by 2boweb

Subject: IT 
Software: Security+ 
Author: Mike Chapple 

Get the training you need to pass the CompTIA Security+ exam. This course covers the access control and identity domain of the test. By learning about concepts such as identification, authorization, authentication, and secure account management practices, you'll be prepared to answer some of the most challenging questions from the Security+ exam.

Author Mike Chapple, an IT leader with over 15 years experience, introduces identification methods such as usernames and biometrics, as well as authentication methods to verify users, including multifactor authentication, password authentication, and single sign-on. He also discusses authorization concepts such as mandatory and discretionary access controls, which can help you restrict access to sensitive parts of your network. The course also covers best practices for ongoing account management, such as establishing a good password policy, managing user roles, and monitoring accounts, and what to do when you need to suspend or terminate access.

NOTE: Lynda.com is now a CompTIA Authorized Content Provider. Our training prepares members to pass CompTIA certification exams and become qualified IT professionals. Find more CompTIA tutorials here.
Topics include:
	•	Setting policies for usernames and access cards
	•	Implementing biometrics
	•	Combining authentication factors for multifactor authentication
	•	Using a Kerberos access control system
	•	Using access control lists such as Windows NTFS file permissions
	•	Role-based authorization
	•	Implementing account and password policies


//////////////////////////////////////////////////////////////////////////

007 Something you have.mp462.24 MiB
001 Welcome.mp420.11 MiB
014 Mandatory access controls.mp49.81 MiB
017 Advanced authorization concepts.mp48.76 MiB
016 Access control lists.mp48.71 MiB
020 Password policy.mp48.25 MiB
005 Authentication factors.mp47.89 MiB
021 Managing roles.mp47.79 MiB
013 Understanding authorization.mp47.36 MiB
004 Biometrics.mp47.13 MiB
011 Kerberos.mp46.99 MiB
010 RADIUS and TACACS.mp46.94 MiB
023 Suspending and terminating access.mp46.88 MiB
019 Account policies.mp46.59 MiB
003 Usernames and access cards.mp46.52 MiB
002 Identification, authentication, and authorization.mp46.05 MiB
006 Multifactor authentication.mp45.45 MiB
009 Single sign-on and federation.mp45.11 MiB
008 Password authentication protocols.mp44.6 MiB
018 Understanding account and privilege management.mp44.29 MiB
012 SAML.mp43.94 MiB
015 Discretionary access controls.mp43.89 MiB
022 Account monitoring.mp43.8 MiB
024 Next steps.mp41.6 MiB