• Online, Self-Paced
Course Description

Information security managers must consider the security risks and potential impact of user access to resources. In this course, you'll explore how to manage and assign user authentication and authorization to use resources for various cloud and local services.

You'll start by distinguishing between authentication and authorization. Next, you'll assign file system permissions in Windows and Linux. You'll then practice assigning permissions policies to AWS users. Lastly, you'll enable multifactor authentication and single sign-on for AWS users.

By the end of this course, you'll be able to create and manage Microsoft AD, Linux, and AWS users and groups and set up various types of permissions for them.

This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections