Access Controls

Intermediate
  • 18 videos | 56m
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 30 users Rating 4.0 of 30 users (30)
Access controls determine the level of access that a security principal has to a network and its resources. Explore authentication mechanisms, trust architectures, the identity management life cycle, and specific access controls.

WHAT YOU WILL LEARN

  • Identify characteristics of authentication and the role it plays in access control
    Describe best practices for implementing single/multifactor authentication
    Describe best practices for implementing single sign-on authentication
    Identify best practices for implementing device authentication
    Describe characteristics of one-way trust relationships in internetwork trust architectures
    Describe characteristics of two-way trust relationships in internetwork trust architectures
    Identify characteristics of transitive trust in internetwork trust architectures
    Describe characteristics of authorization as part of the identity management life cycle
    Identify proofing best practices during the identity management life cycle
  • Describe provisioning activities as part of the identity management life cycle
    Identify maintenance best practices during the identity management life cycle
    Describe entitlement activities during the identity management life cycle
    Describe best practices when implementing mandatory access control
    Describe best practices when implementing non-discretionary access control
    Describe best practices when implementing discretionary access control
    Describe best practices when implementing role-based access control
    Describe best practices when implementing attribute-based access control
    Identify appropriate access controls and best practices for implementation

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
Rating 4.5 of 276 users Rating 4.5 of 276 users (276)
Channel Cybersecurity
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 12 users Rating 4.6 of 12 users (12)
Rating 4.5 of 13 users Rating 4.5 of 13 users (13)
Rating 4.7 of 87 users Rating 4.7 of 87 users (87)