https://www.yourcyberpath.com/88/
\n\nIn this episode we arrive at the end of our\xa0five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication.
\n\nAuthentication is always associated with passwords and how you can prove that you are who you say you are.
\n\nWhen you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field.
\n\nJason and Kip go over the different authentication factors and how you might be asked about them, on a job interview.
\n\nThen they go over different concepts and protocols like SSO, SSL, TLS and how they relate or can be used for authentication.
\n\nIn the End, Kip goes over password managers and what is the criteria for choosing a good password manager.
\n\nWhat You\u2019ll Learn
\n\n\u25cf\xa0\xa0\xa0What is Authentication and how does it look like in the real world?
\n\n\u25cf\xa0\xa0\xa0What is Zero trust?
\n\n\u25cf\xa0\xa0\xa0What is the difference between the different availability options?
\n\n\u25cf\xa0\xa0\xa0What are the five factors of authentication?
\n\n\u25cf\xa0\xa0\xa0What is SSO?
\n\nRelevant Websites For This Episode
\n\n\u25cf\xa0\xa0\xa0https://www.yourcyberpath.com/
\n\nOther Relevant Episodes
\n\n\u25cf\xa0\xa0Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)
\n\n\u25cf\xa0\xa0Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity)
\n\n\u25cf\xa0\xa0Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability)
\n\n\u25cf\xa0\xa0Episode 87 - The CIA Triad - The Basis of Cybersecurity (Nonrepudiation)