Course curriculum

  • 1

    Basics and aim of Access Controls

    • D5-1-Aim of Access Controls

    • Identity Management Lifecycle

  • 2

    Authentication

    • Authentication - Something you have

    • Authentication - Something you are

    • Authentication Protocols

  • 3

    Authorization

    • Authorization

  • 4

    Accountability

    • Accountability

  • 5

    Identity Management Implementations

    • Identity Management System Types

    • What is Single Sign On (SSO)

    • SSO - Directory Services

    • SSO - Kerberos

    • SSO - SESAME

  • 6

    Federated Identity Management (FIM)

    • Federated Identity - SAML 2.0

    • Federated Identity - SPML and XACML

    • Federated Identity - OpenID

    • Federated Identity - OAuth and OpenID Connect

  • 7

    Credential Management Systems

    • Credential Management System

  • 8

    Remote Authentication Protocols

    • RADIUS

    • TACACS Plus

    • Diameter

  • 9

    Identity as a Service (IDaaS)

    • Identity as a Service (IDaaS)

  • 10

    Session Management

    • Session Management

  • 11

    Access Control Models

    • Discretionary Access Control (DAC)

    • Mandatory Access Control (MAC)

    • Rule Based Access Controls (RuBAC)

    • Role Based Access Controls (RBAC)

    • Attribute Based Access Controls (ABAC)

  • 12

    Access Control Attacks

    • Access Control Attacks