CISSP Domain 5 Review / Mind Map (2 of 2) Single Sign-on and Federated Identity Management

CISSP Domain 5 Review / Mind Map (2 of 2) Single Sign-on and Federated Identity Management

HomeDestination CertificationCISSP Domain 5 Review / Mind Map (2 of 2) Single Sign-on and Federated Identity Management
CISSP Domain 5 Review / Mind Map (2 of 2) Single Sign-on and Federated Identity Management
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Review of key concepts and terms related to Single Sign-on and Federated Identity Management (FIM) and how they relate to each other to help you review, guide your study, and help you pass the CISSP exam.

This MindMap report covers:
0:00 Introduction
0:28 Single sign-on / federated access
0:48 One-time login
0:54 Kerberos
1:01 Components of Kerberos
1:07 User / Customer
1:15 Key distribution center
1:27 Authentication service
1:33 Ticket allocation service
1:44 Service tickets
1:52 Worship Service
1:14 Sesame
2;34 Federated Identity Management (FIM)
3:01 Trust relationship in federated access
3:37 SAML
4:08 Components of SAML
4:20 Profile
4:28 Bindings
4:37 Protocol
4:43 Claim
4:50 Federated access protocols
5:12 IDaaS Identities
5:27 Cloud Identity
5:33 Synchronized Identity
5:49 Linked Identity
6:03 Federated Identity
6:17 Outro

Other Mind Maps:

Domain 1
Security and risk management: https://youtu.be/geGALIfOxtI

Domain 2
Asset classification: https://youtu.be/aN9zkmzYTmQ
Data protection: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and frameworks: https://youtu.be/qZB6_lp9M30
Evaluation criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital certificates, digital signatures and PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access control overview: https://youtu.be/BUcoABZzeQ4
Single sign-on and federated access: https://youtu.be/_U4QMIxVk8M

Domain 6
Overview of safety assessment and testing: https://youtu.be/eDVZvw5NziA
Vulnerability analysis and penetration testing: https://youtu.be/vZ0S8GdWiIk
Logging and monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching and change management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure software development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.