We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Identity & Access Management/ZT Specialist

Search

Clear Expand Collapse

Can Zero Trust & Risk Management Coexist?

Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.

Price
Course duration Duration: 31 minutes

CRISC: Certified in Risk and Information Systems Control

The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.

Course duration Duration: 16 hours, 30 min.

Customer IAM & the Path to Making Identity Better

Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.

Course duration Duration: 22 minutes

Demystifying Zero Trust with Greg Touhill

Greg Touhill
Director, CERT Division, Carnegie Mellon University Software Engineering Institute

Course duration Duration: 30 minutes

Hands-on with Windows Server 2019

Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.

Course duration Duration: 7 hours, 25 min.

Identity Security: Moving the Goal Posts

Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.

Course duration Duration: 24 minutes

IDPro: Upscaling Digital Identity Management

Glazer is the senior vice president for identity product management at Salesforce. His responsibilities include leading the product management team, product strategy, and identity standards work.

Price
Course duration Duration: 30 minutes

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Price
Course duration Duration: 74 hours, 15 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

Microsoft 365 Security Administration (MS-500)

This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.

Course duration Duration: 37 hours, 9 min.

SC-300: Microsoft Identity and Access Administrator

SC-300: Microsoft Identity and Access Administrator certification validates expertise in managing identities, implementing access management solutions, and securing authentication with Microsoft tools.

Course duration Duration: 16 hours

This Is How You Fail

Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.

Course duration Duration: 27 minutes

Winning the Account Takeover Battle

Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
 

Price
Course duration Duration: 35 minutes

Zero Trust and Microsegmentation

Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.

Course duration Duration: 12 minutes

Zero Trust Case Study: Inwood Bank

Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.

Course duration Duration: 25 minutes

ZT Q&A with Greg Touhill

In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.

Course duration Duration: 11 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement