01 - Course Overview
02 - Introduction
03 - Identification vs. Authentication vs. Authorization
04 - Identification, Biometrics, and PIV
05 - Username
06 - Authentication and Multi-factor Authentication
07 - Authentication Factors
08 - Authorization
09 - Single Sign-on
10 - Federation
11 - Module Overview
12 - Introduction
13 - Authentication Services
14 - RADIUS
15 - TACACS and TACACS+
16 - Kerberos
17 - LDAP
18 - Secure LDAP
19 - SAML
20 - PAP
21 - CHAP
22 - MS-CHAP
23 - oAUTH
24 - OpenID
25 - Tokens
26 - NTLM_NTLMv2
27 - Module Overview
28 - Introduction
29 - Access Control Methods
30 - Mandatory Access Control
31 - Discretionary Access Control
32 - Rule-based and Role-based Access Control
33 - Attribute Based Access Control (ABAC)
34 - Smart Cards and Proximity Cards
35 - Biometric Factors
36 - TOTP
37 - HTOP
38 - PIV and CAC
39 - Port Security and 802.1x
40 - Database Encryption
41 - Module Review
42 - Introduction
43 - User Accounts
44 - Account Management
45 - Privileged Accounts
46 - Least Privilege
47 - Onboarding_offboarding
48 - Permissions Auditing and Review
49 - Time of Day Restrictions
50 - Recertification
51 - Standard Naming Conventions
52 - User Access Best Practices
53 - Credential Management
54 - Group Policy
55 - Password Complexity
56 - Expiration
57 - Recovery
58 - Disablement
59 - Lockout
60 - Password History
61 - Password Reuse