CompTIA Cloud+ (CV0-003): Cloud Identity & Access Management


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

Expected Duration (hours)
1.2

Lesson Objectives

CompTIA Cloud+ (CV0-003): Cloud Identity & Access Management

  • discover the key concepts covered in this course
  • describe how to configure identity and access management (IAM) including identification, authorization, and privileged access management
  • describe how to use the Lightweight Directory Access Protocol (LDAP) to manage access to resources
  • describe how identity federation can be used to manage user identities
  • describe how certificate management relates to certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers
  • describe how multi-factor authentication (MFA) can be used for access control
  • describe how single sign-on (SSO) can be used to reduce the need to sign on to multiple systems
  • describe how Public Key Infrastructure (PKI) is used to create, manage, distribute, use, store, and revoke digital certificates
  • describe how secret and key management can be used to centrally manage security keys
  • describe the components that can be used to perform incident response preparation
  • describe the importance of incident response procedures such as isolation and containment, restoration, and root cause analysis
  • summarize the key concepts covered in this course
  • Course Number:
    it_clcloudp_05_enus

    Expertise Level
    Intermediate