Identity management is the active administration of subjects, objects, and their relationships regarding access privileges. In this course, you will learn how identity management and authentication are done. You will see how reliable authentication is a core component of modern IT solutions. You will also learn about the weaknesses and exploitations of authentication.
A solid understanding of TCP/IP protocols and how they work
A strong foundation in basic networking concepts
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.