MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

SSCP®: Access Controls

Course Summary

Part 1 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security ad


  • +

    Course Syllabus

    ● Systems Security Certified Practitioner Introduction
        ◦ Goals for the Course
        ◦ Domain 1: Access Controls
        ◦ Domain 2: Security Operations and Administration
        ◦ Domain 3: Monitoring and Analysis
        ◦ Domain 4: Risk, Response, and Recovery
        ◦ Domain 5: Cryptography
        ◦ Domain 6: Networks and Communication
        ◦ Domain 7: Malicious Code and Activity
    ● Logical Access Controls
        ◦ Access Control Subjects and Objects
        ◦ Identification and Authentication
        ◦ Authorization
        ◦ Access Control System
        ◦ Typical Access Control System Properties
        ◦ Protecting Objects with File Permissions
        ◦ Protecting Objects with User Rights
    ● Authentication Mechanisms
        ◦ Authentication and Authorization
        ◦ Passwords
        ◦ Shoulder Surfing and Keylogging
        ◦ Sniffing
        ◦ Phishing
        ◦ Dictionary Attacks
        ◦ Brute Force Attacks
        ◦ Social Attacks
        ◦ Re-use Attacks
        ◦ Rainbow Tables
        ◦ Smart Cards
        ◦ One-time Passwords
        ◦ Biometrics
    ● Centralized Authentication
        ◦ Centralized Authentication
        ◦ Decentralized Authentication
        ◦ Single Sign-on
        ◦ Kerberos
        ◦ RADIUS
        ◦ TACACS+
        ◦ TACACS and XTACACS
        ◦ LDAP
    ● Access Control Concepts
        ◦ Least Privilege
        ◦ Separation of Duties
        ◦ Clark-Wilson
        ◦ Mandatory Vacations
        ◦ Job Rotation
        ◦ Discretionary Access Control
        ◦ Mandatory Access Control
        ◦ Role-based Access Control
        ◦ Rule-based Access Control
        ◦ Bell-LaPadula
        ◦ Biba
    ● Internetwork Trust Architectures
        ◦ Delegating Trust
        ◦ Extranets
        ◦ Federated Access
        ◦ Trusting an Outside Organization
        ◦ New Account
        ◦ External Trust
        ◦ Mergers
    ● Identity Management
        ◦ User vs. Group Management
        ◦ Group Privileges
        ◦ Separation of Duties for Individual Users
        ◦ Time Restrictions
        ◦ Disable, Don't Delete
        ◦ Permissions in Windows
        ◦ Password Policies
        ◦ Educate Your Users
        ◦ Strong Passwords
        ◦ Demo: Password Policies

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

This course is listed under Networks & IT Infrastructure and IT Security & Architecture Community

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top