
Pluralsight – The Issues of Identity and Access Management (IAM)
English | Size: 398.82 MB
Category: CBTs
In this course, you’ll learn how to look at IAM in the proper perspective, as well as the security issues that you should be aware of in your own organization.
IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due to staff complacency, as well as external online threats such as zero-day attacks. To limit the presence of these threats, many IT departments are using identity and access management (IAM) solutions. [Read more…]