Certified in Cybersecurity (CC): Physical Access Controls
Cybersecurity
| Beginner
- 10 videos | 34m 48s
- Includes Assessment
- Earns a Badge
Many security practitioners learn about physical security by comparing it to protecting a medieval castle. Defense in Depth (DiD) relies on multiple layers of independent methods of security and must be used with either an outward-in or inward-out approach. Begin this course by exploring fundamental physical security concepts and mechanisms such as privileged access management (PAM) and segregation of duties (SoD). Then you will focus on badge systems, gate/facility entry, and environmental controls design. Next, you will examine biometric authentication, including crime prevention through environmental design (CPTED). Finally, you will learn about various monitoring systems like syslog, NetFlow, security information and event management (SIEM), and security orchestration, automation, and response (SOAR). This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline access control concepts, including elements such as subjects, resource objects, and rulesDescribe physical defense in depth principles, such as an outward-in approach to protect the campus, facility, or office spaceDefine privileged access management, including provisioning and deprovisioning, and onboarding and offboarding physical components for joiners, movers, and leaversDescribe segregation of duties, also referred to as separation of duties compartmentalization
-
Describe badge systems like smart, common access card (cac), and proximity cards, as well as gate entry methods with or without human guardsDescribe the design of environmental controls, including crime prevention through environmental design (cpted)Compare biometric authentication mechanisms such as fingerprint, ocular, facial recognition, and voice recognitionDescribe physical security monitoring mechanisms such as cameras, guards, sensors, alarms, and sentriesSummarize the key concepts covered in this course
IN THIS COURSE
-
53sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 40sAfter completing this video, you will be able to outline access control concepts, including elements such as subjects, resource objects, and rules. FREE ACCESS
-
3m 13sUpon completion of this video, you will be able to describe physical Defense in Depth principles, such as an outward-in approach to protect the campus, facility, or office space. FREE ACCESS
-
3m 51sAfter completing this video, you will be able to define privileged access management, including provisioning and deprovisioning, and onboarding and offboarding physical components for joiners, movers, and leavers. FREE ACCESS
-
2m 39sIn this video, we will describe segregation of duties, also referred to as separation of duties compartmentalization. FREE ACCESS
-
4m 18sUpon completion of this video, you will be able to describe badge systems like smart, Common Access Card (CAC), and proximity cards, as well as gate entry methods with or without human guards. FREE ACCESS
-
3m 31sIn this video, we will describe the design of environmental controls, including crime prevention through environmental design (CPTED). FREE ACCESS
-
5m 6sAfter completing this video, you will be able to compare biometric authentication mechanisms such as fingerprint, ocular, facial recognition, and voice recognition. FREE ACCESS
-
5m 2sUpon completion of this video, you will be able to describe physical security monitoring mechanisms such as cameras, guards, sensors, alarms, and sentries. FREE ACCESS
-
34sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.