Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Identity and Access Management
#Privileged Access Management
#Cloud IAM
#Okta
#Federated Identity Management
#Keycloak
#Identity-Aware Proxy
#Identity Federation
Showing:
174
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HashiCorp
Enable Modern Privileged Access Management
1
rewiews
Explore modern PAM workflows using Boundary and Vault for identity-driven, secure user access across dynamic environments. Learn key differences from traditional approaches and overcome common challenges.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
INFOSEC TRAIN
How to Prepare for CISSP Domain 5 - Identity and Access Management - InfosecTrain
1
rewiews
Comprehensive overview of CISSP Domain 5, covering authentication methods, biometrics, access control technologies, federation, SAML, IAM, LDAP, and Kerberos for exam preparation and practical understanding.
Add to list
19
Lesons
1 hour 15 minutes
On-Demand
Free-Video
Microsoft
Secure Access and Improve Efficiency With Microsoft Entra Innovations That Span Azure
1
rewiews
Discover proactive strategies and new Microsoft Entra solutions to strengthen security, reduce costs, and improve efficiency in multicloud environments while facing economic uncertainty and escalating cyberthreats.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Stanford University
Stanford Seminar - Computer Security- The Mess We're In, How We Got Here, and What to Do About It
0
rewiews
Explore the complexities of Identity and Access Management, its fundamental flaws, and potential solutions in this insightful seminar by Alan Karp on computer security challenges.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Cloud Security Alliance
Unlocking the Potential of Zero Trust in Privileged Access Management
0
rewiews
Explore micro authorizations in Privileged Access Management for Zero Trust initiatives. Learn how precision, adaptability, and contextual awareness redefine access control in modern cybersecurity.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Google Cloud Platform Beginner Series
0
rewiews
Comprehensive introduction to Google Cloud Platform, covering key technologies, hands-on exercises, and practical applications for beginners in cloud computing.
Add to list
18
Lesons
6 hours
On-Demand
Free-Video
Microsoft
Enhance IoT Solution Security by Using Azure Defender for IoT
0
rewiews
Enhance IoT solution security using Azure Defender for IoT. Learn about security considerations, threat modeling, and Azure services for comprehensive IoT security from device to cloud.
Add to list
14
Lesons
1 hour 23 minutes
On-Demand
Free-Video
CISSP Certification Exam Lectures
0
rewiews
Comprehensive preparation for the CISSP certification exam, covering all 8 domains of information security management and providing strategies for exam success.
Add to list
14
Lesons
17 hours
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive cybersecurity training covering risk management, asset security, engineering, networking, access management, and secure development. Prepares for CISSP certification and career advancement.
Add to list
67
Lesons
1 day 7 hours
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive guide to CISSP certification: exam preparation, key domains, testing strategies, and maintaining credentials for information security professionals.
Add to list
17
Lesons
30 minutes
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive overview of CISSP certification, covering 8 domains with focus on key concepts, exam preparation strategies, and practical security knowledge.
Add to list
50
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Full CISSP Training Videos by Domain
0
rewiews
Comprehensive exploration of 8 essential domains in information systems security, covering risk management, asset protection, architecture, networking, access control, testing, operations, and software security.
Add to list
8
Lesons
3 hours 30 minutes
On-Demand
Free-Video
HashiCorp
Vault Authentication and Auth Methods: Kubernetes, LDAP, and OKTA - Part 11
0
rewiews
Vaultの認証システムにおけるKubernetes、LDAP、OKTAの統合方法を解説。セキュアなアクセス管理と認証プロセスの効率化について学べる。
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
LASCON
Enterprise-Wide Multi-Factor Authentication: Beyond Passwords - 2017
0
rewiews
Explore enterprise-wide multi-factor authentication deployment, focusing on passwordless solutions for secure, flexible access across devices and work scenarios. Learn technical challenges and user experience considerations.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Web Infrastructures - Security and Network Forensics Lecture 11
0
rewiews
Explore web infrastructure security: identity management, authentication methods, access control, and federated systems. Gain insights into SOAP, LDAP, Radius, Kerberos, and more.
Add to list
13
Lesons
36 minutes
On-Demand
Free-Video
Microsoft
New Microsoft Security, Compliance, and Identity Certifications
0
rewiews
Discover Microsoft's new certifications in Security, Compliance, and Identity. Learn about training paths and certification options for security fundamentals, operations, identity access, and information protection.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Microsoft
The Importance of Convergence in Today's Risky Landscape
0
rewiews
Explore how combining Saviynt with Microsoft enhances security and simplifies identity challenges in an expanding threat landscape, offering tool consolidation and improved visibility.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Okta
Kong API Gateway Integration with Okta OIDC Authentication
0
rewiews
Integrate Kong API gateway with Okta OIDC for seamless authentication, eliminating the need for your application to manage OIDC flows directly.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Okta
Shift-Left DevOps for APIs with Okta and JFrog - Developer Day 2021
0
rewiews
Strengthen your shift-left DevSecOps strategy by automating REST API security validation using Okta and JFrog. Learn to verify authentication and authorization policies before production release.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
High-Level API Security with Keycloak - FAPI Implementation and Conformance
0
rewiews
Explore high-level API security using Keycloak, focusing on OAuth 2.0, FAPI, and advanced features for robust authorization in digital transformation contexts.
Add to list
17
Lesons
31 minutes
On-Demand
Free-Video
Learn With Jason
Adding Authentication to Apps with Okta - Learn With Jason
0
rewiews
Implement user authentication in Gatsby apps using Okta. Learn to set up secure user accounts, integrate sign-in widgets, and manage JSON Web Tokens for enhanced app functionality.
Add to list
1
Lesons
1 hour 36 minutes
On-Demand
Free-Video
Linux Foundation
Lightweight Zero-Trust Network Implementation and Transition with Keycloak and NGINX
0
rewiews
Explore lightweight zero-trust network implementation using Keycloak and NGINX, covering JWT validation, OAuth MTLS, and security boundary transitions for enhanced API and service protection.
Add to list
13
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
Zero Trust Best Practices in Government and Federal Industries
0
rewiews
Explore key components and best practices for implementing zero trust security in government and federal industries, focusing on comprehensive protection strategies and advanced technologies.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Identity Based Segmentation for Zero Trust Architecture
0
rewiews
Explore Zero Trust Architecture implementation using identity-based segmentation, focusing on cloud-to-premises communication through DMZs with identity-aware proxies and service mesh.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
HashiCorp
Enable Modern Privileged Access Management with HashiCorp Boundary
0
rewiews
Discover modern privileged access management with HashiCorp Boundary, enabling identity-driven secure user access across dynamic environments while adopting zero trust security strategies.
Add to list
6
Lesons
45 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Keycloak: The Open-Source IAM for Modern Applications
0
rewiews
Explore Keycloak, an open-source identity and access management solution. Learn its features, flexibility, and compliance capabilities for modern applications, as well as future developments and contribution opportunities.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Okta
Building an Identity Platform Using Okta for Healthcare Applications
0
rewiews
Explore building a secure, compliant identity platform for healthcare apps using Okta. Learn to create abstractions, SDKs, and React hooks for improved developer experience and standardized identity management.
Add to list
28
Lesons
29 minutes
On-Demand
Free-Video
Okta
Advanced API Security with Kong - Developer Day 2021 Labs
0
rewiews
Learn to secure APIs using Kong Gateway and Okta. Configure OIDC authentication for Kong Developer Portal and Manager, and explore various security plugins and features.
Add to list
18
Lesons
1 hour 17 minutes
On-Demand
Free-Video
Okta
Integrating Identity into APIs with Okta and Kong - Developer Day 2021
0
rewiews
Discover powerful authentication and authorization scenarios using Kong and Okta. Learn to implement sophisticated API access and management flows with OIDC and OAuth, including CI/CD pipeline integration.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
Okta
Best Practices for Okta Developers in Web, Mobile, and API Development
0
rewiews
Learn best practices for secure, performant web, mobile, and API development with Okta. Discover tips for CI pipeline access, developer tenants, and integrations with Atlassian and Amazon.
Add to list
21
Lesons
42 minutes
On-Demand
Free-Video
Okta
AWS and Okta: New Best Practices for Identity Management and Security - One Year Later
0
rewiews
Explore the latest AWS-Okta integration strategies, focusing on improved identity management, security practices, and operational efficiency for your AWS environments.
Add to list
27
Lesons
45 minutes
On-Demand
Free-Video
Rawkode Academy
Introduction to Teleport - Secure Access Management for Linux and Kubernetes
0
rewiews
Explore Teleport for secure infrastructure access management, covering installation, user creation, SSH auditing, CLI usage, and Kubernetes integration.
Add to list
9
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Security BSides San Francisco
Advanced Persistent Teenagers - Understanding the Lapsus$ Playbook
0
rewiews
Explore how teenage hackers breached major tech companies, analyze their techniques, and learn effective defense strategies against similar attacks.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Learn to Navigate the Perils and Pitfalls of Multi-Tenant Identity Infrastructure
0
rewiews
Explore challenges and solutions in multi-tenant identity management for B2B, B2C, and M2M environments, focusing on security, user experience, and balancing isolation with resource sharing.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
NashKnolX
How to Implement Keycloak Authentication in React
0
rewiews
Implement Keycloak authentication in React applications for enhanced security and access management in web-based projects.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Red Hat Developer
Securing Digital Frontiers: Leveraging Keycloak for Comprehensive Application Security
0
rewiews
Explore Red Hat's Keycloak for robust identity and access management in diverse deployment environments, ensuring application security and mitigating financial risks.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
SANS
The SaaS-y Side of Incident Response - Key Log Sources for Okta, GitHub, and Salesforce
0
rewiews
Explore key log sources for Okta, GitHub, and Salesforce in cloud-based incident response. Learn to interpret SaaS logs, avoid common pitfalls, and improve detection strategies for effective security management.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Linux Foundation
Guide to Authentication and Authorization for Cloud Native Applications with Keycloak
0
rewiews
Explore Keycloak for robust authentication and authorization in cloud-native apps. Learn about single sign-on, passwordless auth, social login, and secure API profiles for enhanced security and user experience.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
RSA Conference
Beyond the Firewall - Ensuring OT Application Security
0
rewiews
Explore OT application security principles, including IAM, secure development environments, secure coding for PLCs, and change detection strategies to enhance your operational technology security posture.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
IAM Confused - Getting Work Done and Keeping SecOps Happy
0
rewiews
Explore effective IAM strategies to balance productivity and security in cloud environments, addressing common challenges and implementing best practices for access management.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
NDC Conferences
Surprising Ways to Escalate Privileges in Entra ID
0
rewiews
Explore common pitfalls and privilege escalation techniques in Entra ID. Learn to identify, prevent, and monitor security risks through practical demonstrations and expert insights.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
IBM
Identity Fabric Explained: Success Stories and Hybrid Security Solutions
0
rewiews
Explore Identity Fabric in cybersecurity, covering IAM, frictionless authentication, ITDR, and PAM. Learn strategies for securing hybrid environments through real-world success stories.
Add to list
1
Lesons
13 minutes
On-Demand
Free-Video
HashiCorp
Getting into HashiCorp Boundary - Introduction
0
rewiews
Explore HashiCorp Boundary's use cases and setup process with experts Cole Morrison and Rosemary Wang in this comprehensive introduction to privileged access management.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Conf42
Replacing Privileged Users with Just-in-Time Access Requests
0
rewiews
Learn how to implement just-in-time access requests to enhance security and reduce privileged user risks in your organization's infrastructure.
Add to list
2
Lesons
27 minutes
On-Demand
Free-Video
WEareTROOPERS
Attacking Primary Refresh Tokens Using MacOS Implementation - TROOPERS24
0
rewiews
Explore techniques for attacking Primary Refresh Tokens through MacOS implementation, presented by security experts at TROOPERS24 conference in Heidelberg.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Google Cloud Tech
Simplifying Identity Onboarding with Workforce Identity Federation
0
rewiews
Explore Workforce Identity Federation for simplified, secure access to Google Cloud using your existing identity provider, eliminating the need for Google identities.
Add to list
8
Lesons
18 minutes
On-Demand
Free-Video
DevSecCon
Security with Phishing-Resistant Multi-Factor Authentication
0
rewiews
Explore phishing-resistant multi-factor authentication to enhance security, prevent attacks, and implement passwordless strategies for seamless user experiences.
Add to list
5
Lesons
23 minutes
On-Demand
Free-Video
EuroPython Conference
Impersonation in Data Engineering: No More Credentials in Your Code
0
rewiews
Discover how to streamline data engineering workflows using IAM, Workload Identity, and impersonation. Eliminate credential hassles, improve security, and boost productivity in your development process.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Conf42
Adding Security for Reliable Continuous Delivery
0
rewiews
Enhance security in continuous delivery: Learn containerization challenges, vulnerabilities, misconfigurations, supply chain attacks, and IAM. Explore solutions and see a practical demo.
Add to list
18
Lesons
46 minutes
On-Demand
Free-Video
Databricks
Administrator Best Practices for Scaling and Securing Databricks Deployments
0
rewiews
Optimize Databricks administration for enterprise-scale deployments. Learn best practices, new capabilities, and customer insights for efficient onboarding, security, and workspace management.
Add to list
13
Lesons
40 minutes
On-Demand
Free-Video
LASCON
Three Profiles of OAuth2 for Identity and Access Management - 2016
0
rewiews
Explore OAuth2 profiles for identity and access management, covering OpenID Connect, UMA, and Google's approach. Learn strategies for implementing OAuth2 in enterprise security infrastructure.
Add to list
25
Lesons
45 minutes
On-Demand
Free-Video
Okta
Build a Spring Boot Application Using Opaque and JWT Access Tokens
0
rewiews
Learn to implement both JWT and opaque access tokens in a Spring Boot app, gaining benefits from each. Explore code examples and best practices for secure authentication.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
OpenInfra Foundation
Modernizing OpenStack with Kubernetes, Cluster API, Keycloak and Rust
0
rewiews
Discover how to modernize OpenStack deployments using cutting-edge technologies like Kubernetes, Cluster API, and Keycloak, with insights into potential Rust integration for enhanced performance.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Microsoft
Azure Active Directory: Strengthening Zero Trust Defenses in the Hybrid Era - Ask the Expert
0
rewiews
Explore Azure AD's vision for strengthening Zero Trust defenses in hybrid environments. Learn about advanced threat protection strategies and upcoming features to enhance security.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Untangling Multi-Cloud Identity and Access with SPIFFE Tornjak
0
rewiews
Explore secure multi-cloud workload identity management using SPIFFE/SPIRE and Tornjak, shifting from platform-specific to organization-wide approaches for consistent access across cloud providers.
Add to list
9
Lesons
26 minutes
On-Demand
Free-Video
OWASP Foundation
Detecting Credential Compromise in AWS
0
rewiews
Learn how to detect compromised AWS credentials without prior IP knowledge, crucial for preventing costly data breaches and infrastructure abuse in cloud environments.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Zero Privilege Architectures - Modern IT Security Approach
0
rewiews
Explore modern IT architecture for enhanced security, using CI/CD, data services, events, and IAM. Learn how ING implements this approach and address common concerns about adoption and compatibility.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Securing Requests with Keycloak and Istio through Request-Level Authentication
0
rewiews
Explore request-level authentication using Keycloak and Istio to enhance security in cloud-native environments. Learn implementation techniques for robust access control.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Don't Mind the Gap - Securely Accessing Cloud Resources with SPIFFE/SPIRE
0
rewiews
Explore secure cloud resource access using SPIFFE/SPIRE for identity federation. Learn to access AWS and other services without managing API keys, simplifying cross-cloud interactions.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Multi Cluster Service Mesh Operations and Extensibility with WebAssembly
0
rewiews
Explore multi-cluster service mesh patterns, operations, and WebAssembly extensibility for resilient, scalable cloud-native applications across hybrid deployments. Learn design patterns, service discovery, and customization techniques.
Add to list
14
Lesons
58 minutes
On-Demand
Free-Video
BSidesLV
The Art of Letting Go: Secure Delegation of Permissions in AWS Environments
0
rewiews
Explore secure delegation of AWS permissions using SCPs, IAM boundaries, and policies. Learn to empower engineering teams while maintaining security through automated compliance and remediation.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Okta
Enterprise Ready Workshop: Automating Okta Environment with Terraform
0
rewiews
Automate Okta environment creation using Terraform, elevating SaaS apps in the identity maturity journey. Learn to implement identity as code for enhanced enterprise-ready authentication solutions.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Okta
Building a Single-Page Application with JHipster, Vue.js, and Okta
0
rewiews
Learn to build modern web apps using JHipster, integrating Vue.js for the front-end, Spring Boot for the back-end, and Okta for secure authentication. Discover how to streamline development with this powerful combination.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Okta
Internationalization in Java 11, Spring Boot, and JavaScript
0
rewiews
Discover techniques for internationalizing and localizing Java, Spring Boot, and JavaScript applications, enhancing global user experience and accessibility.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Okta
The Power of SDKs - Delivering Secure and Delightful Developer Experiences
0
rewiews
Explore innovations in SDKs for enhanced developer experience and security. Learn how Auth0 delivers delightful and secure solutions for developers through SDK advancements.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Okta
Getting Started with Spring Boot and SAML
0
rewiews
Practical guide to implementing SAML authentication in Spring Boot apps. Covers setup, customization, multi-provider support, and deployment, with step-by-step instructions and code examples.
Add to list
11
Lesons
27 minutes
On-Demand
Free-Video
Okta
Self Service OAuth with Okta and Terraform
0
rewiews
Learn to automate OAuth application setup using Okta and Terraform. This tutorial covers code implementation, module declaration, resource creation, and testing for a self-service authorization experience.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
Okta
Building a Simple CRUD App with React and Spring Boot - Tutorial
0
rewiews
Learn to build a secure CRUD application using React and Spring Boot, integrating authentication with Auth0 or Okta, and configuring Spring Security for seamless frontend-backend interaction.
Add to list
14
Lesons
42 minutes
On-Demand
Free-Video
Okta
Full Stack Java with React, Spring Boot, and JHipster - Creating a Secure Application
0
rewiews
Learn to build a secure, full-stack Java application using React, Spring Boot, and JHipster. Create a photo gallery app with CRUD operations, EXIF processing, and deploy it as a PWA on Heroku.
Add to list
19
Lesons
31 minutes
On-Demand
Free-Video
Okta
Centralizing Authentication with Kong and Okta
0
rewiews
Learn to centralize authentication using Kong and Okta, exploring Docker infrastructure, Spring Boot integration, and OpenID Connect configuration for secure API management.
Add to list
13
Lesons
28 minutes
On-Demand
Free-Video
Okta
Modern SPAs Made Easy with JHipster - Creating Vue.js and Spring Boot Applications
0
rewiews
Aprenda a criar aplicações SPA modernas com Vue.js, Spring Boot e autenticação Okta usando OAuth, tudo integrado pelo JHipster. Descubra como simplificar o desenvolvimento de aplicações web robustas e seguras.
Add to list
12
Lesons
48 minutes
On-Demand
Free-Video
Okta
Alexa Account Linking with Okta - Developer Tutorial
0
rewiews
Learn to integrate Alexa with Okta for secure account linking, enhancing user authentication in voice-controlled applications and exploring developer tools.
Add to list
5
Lesons
21 minutes
On-Demand
Free-Video
Okta
Build a CRUD App with ASP.NET Core and SQL Server
0
rewiews
Learn to build a functional CRUD application using ASP.NET Core 2.2 and SQL Server, covering scaffolding, database setup, and authentication integration.
Add to list
14
Lesons
42 minutes
On-Demand
Free-Video
Okta
Build a Basic CRUD App with Angular 5.0 and Spring Boot 2.0
0
rewiews
Learn to build and secure a full-stack web application using Angular 5.0 and Spring Boot 2.0, integrating frontend and backend technologies for efficient CRUD operations.
Add to list
6
Lesons
25 minutes
On-Demand
Free-Video
Okta
Build a Basic CRUD App with Angular 7.0 and Spring Boot 2.1
0
rewiews
Learn to create a secure CRUD application using Angular 7.0 and Spring Boot 2.1, integrating Spring Security and Okta for robust authentication and authorization.
Add to list
8
Lesons
34 minutes
On-Demand
Free-Video
Okta
Full Stack Reactive Development with Spring WebFlux, WebSockets, and React
0
rewiews
Develop a reactive API with Spring WebFlux, create a React app for HTTP and WebSocket communication, and secure it using Spring Security and Okta's React SDK.
Add to list
30
Lesons
48 minutes
On-Demand
Free-Video
DefCamp
A Methodical Approach to Privilege Escalation in AWS
0
rewiews
Explore methodical AWS privilege escalation techniques with Senior Penetration Tester Eduard Agavriloae. Learn advanced cybersecurity strategies for identifying and exploiting vulnerabilities in cloud environments.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
IAM Confused: Analyzing 8 Identity Breach Incidents
0
rewiews
Dissection of 8 real cloud breaches exploiting insecure identities, revealing insights and mitigation strategies for better identity and access management in cloud environments.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Learn With Jason
SCIM Provisioning in Node Express Using WorkOS and Okta
0
rewiews
Learn to implement SCIM provisioning in a Node Express app using WorkOS and Okta. Covers setup, directory sync, webhooks, and handling events for efficient user account management in SaaS applications.
Add to list
10
Lesons
15 minutes
On-Demand
Free-Video
Kode Kloud
AWS Security - Shared Responsibility Model, Compliance, and IAM
0
rewiews
Explore AWS security essentials: shared responsibility model, compliance, and IAM. Learn how to secure your cloud resources and understand AWS security best practices for developers and IT professionals.
Add to list
8
Lesons
30 minutes
On-Demand
Free-Video
Conf42
Say Goodbye to Manual Kubernetes User Access Onboarding
0
rewiews
Automate Kubernetes user access onboarding for enhanced security and efficiency in DevOps environments.
Add to list
2
Lesons
22 minutes
On-Demand
Free-Video
Code Sync
Zero Trust RabbitMQ with HashiCorp Vault
0
rewiews
Implement Zero Trust security for RabbitMQ using HashiCorp Vault. Learn to manage access, ensure data confidentiality, and simplify cryptography for secure messaging in a demo-driven exploration.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Databricks
Databricks Lakehouse Platform - Governance and Security Fundamentals
0
rewiews
Learn fundamentals of governance and security for cloud data platforms, covering identity management, private links, access monitoring, cost control, and policy enforcement for workspaces.
Add to list
16
Lesons
55 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Cloud Native Kubernetes for Public Safety Systems - A Case Study
0
rewiews
Exploring Kubernetes implementation for public safety systems, focusing on automation, scalability, and cost management in a diverse technological environment.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Securing Kubernetes - Best Practices and Effective Strategies
0
rewiews
Explore best practices for securing Kubernetes deployments, covering control plane protection, RBAC, network policies, security contexts, and container image security.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Challenge to Implementing Scalable Authorization with Keycloak
0
rewiews
Explore scalable authorization implementation using Keycloak, combining it with OPA and CockroachDB for enhanced security, performance, and multi-cloud resilience in API and service development.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Linux Foundation
How SPIFFE Helps Istio in Service Mesh Federation
0
rewiews
Explore SPIFFE's role in Istio service mesh federation, focusing on identity federation across trust domains and secure cross-mesh communication. Includes demonstration of Istio-SPIRE system setup.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
HashiCorp
Deploying Nomad on Google Cloud - Setting Up Web UI Access
0
rewiews
Set up DNS, Global Load Balancer, and Identity-Aware Proxy to access Nomad's web UI on Google Cloud. Learn to inspect clusters, submit, and manage jobs via browser interface.
Add to list
10
Lesons
43 minutes
On-Demand
Free-Video
John Savill's Technical Training
Azure Master Class - Identity
0
rewiews
Explore Azure AD's identity management features, including authentication, authorization, roles, MFA, and conditional access. Master key concepts for secure and efficient identity solutions.
Add to list
19
Lesons
2 hours 17 minutes
On-Demand
Free-Video
nullcon
Career Opportunities in Information Security
0
rewiews
Explore diverse career paths in information security with insights from a seasoned professional. Learn about key roles, skills, and opportunities in this rapidly evolving field.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Ekoparty Security Conference
AWS Well-Architected Framework - Security Pillar
0
rewiews
Guía de estrategias para diseñar sistemas seguros en la nube, abordando gestión de identidades, detección, protección de infraestructura, protección de datos y respuesta a incidentes en AWS.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
nullcon
PAM Maturity From Zero Trust To Least Privilege
0
rewiews
Panel discussion on PAM maturity, exploring the journey from zero trust to least privilege. Industry experts share insights on implementing effective privileged access management strategies in modern cybersecurity landscapes.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
LASCON
It Takes a Village to Get Security Right - Building Collaborative IAM Solutions
0
rewiews
Explore trends in Identity and Access Management, including multi-factor authentication and perimeter-less security. Learn about specialized IAM solutions and industry efforts for interoperability among vendors.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Red Hat
Middleware Security - Authentication, Authorization, and Auditing Services
0
rewiews
Explore middleware security essentials: authentication, authorization, auditing. Learn about Red Hat's solutions, including single sign-on service, and real-world implementations for secure enterprise IT control.
Add to list
25
Lesons
54 minutes
On-Demand
Free-Video
NorthSec
Authentication Challenges in SaaS Integration and Cloud Transformation
0
rewiews
Explore authentication challenges in SaaS integration and cloud transformation, focusing on security pitfalls, unmanaged cloud identities, and the importance of cloud-based Identity Provider solutions.
Add to list
6
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
Attribute Based Access Control - Why, What, How
0
rewiews
Explore digital identity trends, ABAC implementation, and data protection in finance. Learn from ABNAMRO's experience with Attribute Based Access Control and its impact on security and regulation compliance.
Add to list
31
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Modern and Secure IAM for Modern Applications
0
rewiews
Explore modern IAM strategies for enhanced application security, covering OpenID, JSON Web Tokens, SAML, and FIDO protocols, with practical insights and a demo.
Add to list
26
Lesons
32 minutes
On-Demand
Free-Video
Microsoft
Prevent Attacks by Protecting Your Applications with Azure Active Directory
0
rewiews
Learn to enhance security by connecting on-premises apps to Azure AD, upgrading from legacy solutions like AD FS, and implementing a cloud-first approach to identity and access management.
Add to list
5
Lesons
24 minutes
On-Demand
Free-Video
Microsoft
Managing Azure Active Directory and Hybrid Joined Windows Clients
0
rewiews
Explore Microsoft's insights on managing hybrid environments, cloud-based client management, and transitioning from on-premises to cloud using Azure AD, Intune, and Autopilot.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Microsoft
The Role of Delegation and Automation in IAM
0
rewiews
Learn effective IAM strategies through delegation and automation in Active Directory and Azure AD, focusing on least privilege models, identity management checklists, and routine task automation.
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
load more...