Domain 5. Identity and Access Management (IAM)

Please purchase the course before starting the lesson.

Introduction There are some traditional methods for controlling access without regard for the asset type. For instance, to authenticate users through validation that they are whom they say they are. A different way to authorize the users is to identify whether they are authorized to perform the required action for the appropriate asset (such as [...]

Back to: CISSP