Companies Home Search Profile

Complete Guide to Identity and Access Management for Network Engineers

Focused View

Liam Cleary

6:48:24

23 View
  • 01 - Complete guide to IAM for network engineers.mp4
    00:49
  • 01 - Overview of IAM in networking.mp4
    06:54
  • 02 - Key components of IAM in network security.mp4
    09:01
  • 03 - Setting up basic IAM roles and policies on Windows Server.mp4
    12:47
  • 04 - IAM framework overview.mp4
    07:25
  • 05 - Basic IAM configuration techniques.mp4
    10:31
  • 01 - Authentication protocols.mp4
    07:53
  • 02 - Understanding multifactor authentication (MFA).mp4
    05:51
  • 03 - Implementing MFA on a Linux server.mp4
    05:19
  • 04 - Configuring MFA for remote access to a Windows environment.mp4
    06:05
  • 05 - Best practices in network authentication.mp4
    06:08
  • 01 - Access control models and implementation.mp4
    12:45
  • 02 - Role-based access control (RBAC) explained.mp4
    10:59
  • 03 - Implementing RBAC in a Windows Server environment.mp4
    09:03
  • 04 - Configuring RBAC on a Linux server.mp4
    07:49
  • 05 - Setting up ACL on Linux for file-level security.mp4
    12:16
  • 06 - Advanced access control techniques.mp4
    09:37
  • 01 - Account lifecycle management overview.mp4
    06:47
  • 02 - Introduction to identity federation.mp4
    15:31
  • 03 - Identity federation in Active Directory.mp4
    10:17
  • 04 - Configuring Azure AD for SSO with SaaS applications.mp4
    06:43
  • 05 - Google Cloud Identity-Aware Proxy for application access.mp4
    05:33
  • 01 - IAM features in AWS.mp4
    06:50
  • 02 - IAM features in Azure.mp4
    06:08
  • 03 - IAM features in GCP.mp4
    06:37
  • 04 - Configuring IAM roles and policies in AWS.mp4
    11:14
  • 05 - Setting up Azure AD and managing IAM in Azure.mp4
    08:04
  • 06 - Implementing service accounts and roles in GCP.mp4
    03:39
  • 01 - IAM monitoring tools and techniques.mp4
    05:39
  • 02 - Setting up audit trails in IAM.mp4
    05:47
  • 03 - Setting up logging in Azure AD.mp4
    08:00
  • 04 - Compliance checks and reporting in GCP.mp4
    03:04
  • 01 - Overview of security protocols in IAM.mp4
    03:51
  • 02 - Implementing encryption in IAM.mp4
    04:33
  • 03 - Configuring SSLTLS on Windows Server.mp4
    10:12
  • 04 - Secure SSH keys within a Linux server.mp4
    05:23
  • 05 - Advanced encryption and key management in Linux.mp4
    09:36
  • 06 - Security best practices in IAM.mp4
    05:44
  • 01 - IAM integration with networking devices.mp4
    06:25
  • 02 - Network access control (NAC) and IAM.mp4
    05:51
  • 03 - IAM for secure remote access.mp4
    08:11
  • 04 - IAM policy implementation in network devices.mp4
    08:06
  • 05 - Managing network device credentials.mp4
    08:32
  • 01 - Introduction to IAM automation.mp4
    11:44
  • 02 - Tools and scripts for IAM automation.mp4
    07:42
  • 03 - Automating user accounts using PowerShell in Windows AD.mp4
    09:56
  • 04 - Python scripts for automated IAM tasks in Linux.mp4
    03:29
  • 05 - Automated IAM report generation using PowerShell and Python.mp4
    07:27
  • 06 - Best practices in IAM automation.mp4
    04:43
  • 01 - Overview of PAM.mp4
    07:14
  • 02 - Key concepts in privileged access management.mp4
    07:24
  • 03 - Configuring PAM in cloud environments.mp4
    04:59
  • 04 - Setting up PAM in Microsoft 365 and Azure.mp4
    08:20
  • 05 - Future directions in PAM.mp4
    06:04
  • 01 - Continuing your IAM journey.mp4
    01:53
  • Description


    The course provides network professionals with a comprehensive exploration of identity and access management. Instructor Liam Cleary covers the fundamentals of IAM, including authentication mechanisms, authorization, access control techniques, and the intricacies of account management and identity federation. Liam also focuses on implementing IAM in cloud environments and strategies for monitoring and reporting to ensure robust security.

    Advanced topics such as security protocols, encryption, and privileged access management (PAM) are also covered, along with practical aspects of integrating IAM with network infrastructure and automating IAM tasks using tools like PowerShell and Python.

    Whether you want to deepen your existing knowledge or branch out into new areas of network security, this course combines theory with practical application, preparing you to manage identities and secure access effectively in any network environment.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Liam began his career as a trainer of all things computer-related. He quickly realized that programming, breaking, and hacking were much more fun. He spent the next few years working within core infrastructure and security services. He is the founder and owner of SharePlicity, a consulting company that focuses on Microsoft 365 and Azure technology. His role within SharePlicity is to help organizations implement Microsoft 365 and Azure technology to enhance internal and external collaboration, document and records management, automate business processes, and implement security controls and protection. He is a Microsoft MVP and Microsoft Certified Trainer, focusing on architecture, security, and crossing the boundary into software development. Over the past few years, his specialty has been security in Microsoft 365, Azure, and its surrounding platforms. Liam also creates online training courses for Pluralsight, LinkedIn Learning, and Cloud Academy and teaches multiple Microsoft certification courses for Opsgility and Microsoft. You can find him at user groups and conferences, teaching classes, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet, building Lego robots, or coaching soccer.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 55
    • duration 6:48:24
    • English subtitles has
    • Release Date 2024/08/12

    Courses related to Network Engineering