• Editorial Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls
    • Data Protection
    • Vulnerability Management
    • Cloud Security
    • Behavioral Threat Analytics
    • Emerging Threats

Lesson 1:


Nobody likes passwords but can next-generation authentication solutions operate without them? Mike Cobb explores the future of authentication methods in this video.

Will passwords ever die?

Lesson 2:


Effective IT security today demands that users be both authenticated and authorized. But even those two steps alone are not enough. Expert Mike Cobb explains.

Authentication and authorization: Working together

Lesson 3:


Cobb discusses the shortcomings of existing online authentication and how new methods and technologies aim to make the process both more secure and less painful.

Understanding next-generation authentication

Lesson 4:


Learn about the impact FIDO may have on authentication and online services.

Adopting FIDO

Lesson 5:


Listen to this podcast to gain a better understanding of which emerging authentication technologies and techniques are most likely to boost your online success.

Emerging authentication technologies

Quiz:


Take this brief quiz to test your knowledge of the issues covered in the lessons that make up our classroom on next-gen autentication

Next-Gen Autentication: Quiz

Next-Gen Autentication

Will we ever say good-bye to passwords? In this Security school Mike Cobb surveys the latest in authentication methods and technologies coming on to the market.

TOP

Michael Cobb
CISSP-ISSAP

Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data and of following good practices.






Editorial Resources

About SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We're the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more -- all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.

Learn More
  • How to buy multifactor authentication tools monitoring tools

  • Strong authentication methods: Are you behind the curve?

  • Windows 10 authentication options leave passwords behind

  • Security Think Tank: Proceed with caution on biometric authentication


Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111