-
Biometric Credentials
After watching this video; you will be able to identify characteristics of biometric credentials.
-
Collecting Attack Evidence
After watching this video; you will be able to identify best practices when collecting evidence and information after a successful attack .
-
Common Logon Attacks
After watching this video; you will be able to distinguish between the different common types of attacks on logon pages.
-
Confirming Account Changes
After watching this video; you will be able to identify best practices for confirming user account changes with users.
-
CSRF
After watching this video; you will be able to identify characteristics of Cross-Site Request Forgery (CSRF).
-
Dealing with Compromised Systems
After watching this video; you will be able to identify best practices for dealing with compromised systems after a successful security attack.
-
Determining Appropriate User Account Policies
After watching this video; you will be able to identify appropriate user account security policies and practices.
-
Development Best Practices
After watching this video; you will be able to identify best practices during development to secure site logon.
-
Disabling Unused Accounts
After watching this video; you will be able to identify best practices for disabling unused user accounts.
-
Enabling Two-Step Verification
After watching this video; you will be able to describe purpose and best practices for implementing two-step verification in user account registration policies.
-
Enforcing Password History Policies
After watching this video; you will be able to describe benefits and best practices for enforcing password history policies.
-
Event Logging
After watching this video; you will be able to identify best practices for event logging as a method for identifying and preventing account security breaches.
-
Implementing Account Change Notifications
After watching this video; you will be able to identify best practices for implementing user account change notifications.
-
Implementing Verification Questions
After watching this video; you will be able to describe best practices for strengthening password reset with verification questions.
-
Importance of User Account Security
After watching this video; you will be able to identify the purpose and requirement for secure user account controls.
-
Limiting Logon Attempts
After watching this video; you will be able to identify characteristics and best practices for limiting logon attempts as a restriction for user accounts.
-
Logon Fraud Detection and Prevention
After watching this video; you will be able to describe best practices for detecting and preventing logon fraud.
-
Managing Simultaneous Sessions
After watching this video; you will be able to identify best practices for managing multiple simultaneous sessions from the same user.
-
Naming Conventions
After watching this video; you will be able to identify characteristics and best practices of implementing appropriate naming convention restrictions for user accounts.
-
Network Protocols
After watching this video; you will be able to identify best-practice network protocols to protect against general security attacks.
-
Neutralizing Attacks
After watching this video; you will be able to describe best practices for neutralizing user account security attacks.
-
Overview of Password Reset
After watching this video; you will be able to identify characteristics and purpose of password reset.
-
Overview of the Logoff Feature
After watching this video; you will be able to identify purpose and characteristics of implementing logoff requirements.
-
Overview of the Logon Feature
After watching this video; you will be able to describe the characteristics and purpose of the logon feature.
-
Password Age Policies
After watching this video; you will be able to describe benefits and best practices for setting minimum and maximum password age requirements.
-
Password Complexity Requirements
After watching this video; you will be able to identify password length; width; and depth requirements that can enhance password security.
-
Password Credentials
After watching this video; you will be able to identify characteristics of password credentials.
-
Password Field Security
After watching this video; you will be able to identify best practices for password field security.
-
Password Hashing Best Practices
After watching this video; you will be able to identify best practices for hashing passwords for storage.
-
Password Hints
After watching this video; you will be able to identify benefits and challenges of using password hints and best practices.
-
Password Storage Best Practices
After watching this video; you will be able to describe best practices for password storage policies.
-
Password Strength Criteria
After watching this video; you will be able to describe best practice for setting minimum password strength criteria policies.
-
Password Strength Feedback
After watching this video; you will be able to describe techniques for providing feedback to users on password strength.
-
Password Verification for Changes
After watching this video; you will be able to describe best practices for using password verification during account change activities.
-
Patches and Updates
After watching this video; you will be able to identify best practices for patching and updating to prevent user account compromise.
-
Permissions Categories
After watching this video; you will be able to distinguish between the different access permissions categories available to assign to account users.
-
Preventing Username Enumeration
After watching this video; you will be able to describe best practices for preventing username enumeration as part of user account registration security.
-
Privilege Management
After watching this video; you will be able to distinguish between users; groups; and role structures for privileges.
-
Protecting against Password Hacking
After watching this video; you will be able to identify best practices for preventing password hack attempts.
-
Registration Basics
After watching this video; you will be able to describe characteristics and purpose of secure user account registration policies and practices.
-
Remote Logoff
After watching this video; you will be able to identify characteristics and best practices for remote logoff procedures.
-
Securing Account Access and Mitigating Risk
After watching this video; you will be able to identify appropriate logon; logoff and account change policies; and describe best practices for responding to account compromise.
-
Securing Logoff Against CSRF
After watching this video; you will be able to describe purpose and techniques for implementing CSRF protection on the logoff feature.
-
Securing User Account Registration
After watching this video; you will be able to identify appropriate user account registration and password best practices.
-
Security Attack Motives
After watching this video; you will be able to describe goals and motives for user account security attacks.
-
Security Attack Phases
After watching this video; you will be able to distinguish between the different phases of a security attack.
-
Session Expiry
After watching this video; you will be able to identify best practices and purpose of session expiry .
-
Setting Account Expiry Dates
After watching this video; you will be able to identify best practices for setting account expiry dates.
-
Setting Machine Restrictions
After watching this video; you will be able to identify best practices for setting machine restrictions on user accounts.
-
Setting Time Restrictions
After watching this video; you will be able to identify best practices for setting time restrictions on user accounts.
-
Ticket-based Hybrid Authentication
After watching this video; you will be able to identify characteristics of ticket-based hybrid authentication credentials.
-
Timed Password Reset
After watching this video; you will be able to identify best practices for implementing timed password resets.
-
User Authentication Components
After watching this video; you will be able to distinguish between the three user authentication components and how they interrelate.
-
User Logon Process
After watching this video; you will be able to identify the phases of the user logon process.
-
Username Best Practices
After watching this video; you will be able to describe best practices for secure usernames and user identifiers.
-
Username Enumeration
After watching this video; you will be able to identify characteristics of username enumeration.
-
Using CAPTCHA
After watching this video; you will be able to identify best practices and purpose of using CAPTCHA for user account registration and setup.
-
Using SSL for Logon Security
After watching this video; you will be able to use SSL to enhance logon security.
-
Vulnerability Scanning
After watching this video; you will be able to identify best practices for performing vulnerability scanning to prevent user account compromise.
-
Web Server Password Cracking
After watching this video; you will be able to distinguish between the different types of web server password cracking techniques.
-
Account Change Risks
After watching this video; you will be able to describe characteristics of account detail changes and how and why they carry risk of attack.
-
Account Protocols
After watching this video; you will be able to identify best-practice account protocols to protect against user account security attacks.
-
Account Verification
After watching this video; you will be able to identify best practices for account registration verification.
-
Asymmetric Key Credentials
After watching this video; you will be able to identify characteristics of asymmetric key credentials for authentication.
-
At-risk Account Attributes
After watching this video; you will be able to identify the specific account attributes that hackers target.
-
Authentication and Identification
After watching this video; you will be able to describe characteristics of the authentication and identification process and the relationship between them.
-
Authentication Credentials Overview
After watching this video; you will be able to identify characteristics and purpose of credentials.
-
Authentication Types
After watching this video; you will be able to distinguish between the different types of authentication.
-
Authenticity
After watching this video; you will be able to describe characteristics of the fundamental security concept of authenticity as it relates to securing user accounts.
-
Confidentiality
After watching this video; you will be able to describe characteristics of the fundamental security concept of confidentiality as it relates to securing user accounts.
-
Integrity
After watching this video; you will be able to describe characteristics of the fundamental security concept of integrity as it relates to securing user accounts.
-
Authorization
After watching this video; you will be able to describe characteristics of authorization.
-
Defense in Depth
After watching this video; you will be able to describe best practices for applying defense in depth in secure user account management.