Certified in Cybersecurity (CC): Logical Access Controls
Cybersecurity
| Beginner
- 9 videos | 20m 16s
- Includes Assessment
- Earns a Badge
There is often a blurred line between physical and logical access control, as the systems typically function together. In this course, you will explore the logical aspect of Defense in Depth and security controls. Next, you will examine discretionary access control (DAC) and mandatory access control (MAC). Finally, you will define role-based access control (RBAC), rule-based access control (RuBAC), and attribute-based access control (ABAC) and learn about their differences. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
WHAT YOU WILL LEARN
-
Summarize the key concepts covered in this courseDefine logical access controls, such as passwords, software multi-factor authentication, and identity management systemsDescribe logical defense in depth, for example multiple engines processing packets in a particular order on a physical or virtual firewall appliance or systemDefine discretionary access controls such as those found in active directory or azureadDefine mandatory access controls used in highly secure environments like military or intelligence agencies
-
Define role-based access controls which are often built into database management systemsDefine rule-based access controls, such as infrastructure access control lists (acls) and network aclsDescribe zero trust environments that shift the security perimeter from the corporate edge component to each individual subjectSummarize the key concepts covered in this course
IN THIS COURSE
-
52sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
-
1m 21sAfter completing this video, you will be able to define logical access controls, such as passwords, software multi-factor authentication, and identity management systems. FREE ACCESS
-
2m 11sUpon completion of this video, you will be able to describe logical Defense in Depth, for example multiple engines processing packets in a particular order on a physical or virtual firewall appliance or system. FREE ACCESS
-
2m 28sAfter completing this video, you will be able to define discretionary access controls such as those found in Active Directory or AzureAD. FREE ACCESS
-
3m 49sUpon completion of this video, you will be able to define mandatory access controls used in highly secure environments like military or intelligence agencies. FREE ACCESS
-
2m 35sIn this video, we will define role-based access controls which are often built into database management systems. FREE ACCESS
-
3m 19sAfter completing this video, you will be able to define rule-based access controls, such as infrastructure access control lists (ACLs) and network ACLs. FREE ACCESS
-
3m 9sUpon completion of this video, you will be able to describe zero trust environments that shift the security perimeter from the corporate edge component to each individual subject. FREE ACCESS
-
33sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.