CISSP 2024: Authorization Mechanisms & Identity Management

CISSP 2024    |    Expert
  • 13 videos | 35m 52s
  • Includes Assessment
  • Earns a Badge
While authentication is technically mandatory, authorization is optional, and if all principals had root or administrative access in a small organization, there would be no need for different access layers. This scenario, however, is quite rare and is a violation of modern identity management and zero-trust initiatives. In this course, learn about the implementation and management of authorization mechanisms and control of the identity and access provisioning lifecycle, including rule-based, role-based, discretionary, mandatory, attribute-based, and risk-based access controls. Next, compare attribute-based access control (ABAC) with RBAC and explore access policy enforcement, account access review, and provisioning/deprovisioning. Finally, examine role definitions and transitions, privilege escalation, and service accounts management. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the purpose of rule-based access control
    Recognize role-based access control (rbac) concepts
    Explore examples of working with discretionary access control (dac)
    Identify what mandatory access control (mac) is
    Differentiate between attribute-based access control (abac) and risk-based access control (rbac)
    Outline access policy enforcement, including policy decision points and policy enforcement points
  • Identify account access review details for a user, system, and service
    Differentiate provisioning and deprovisioning and onboarding/offboarding
    Recognize role definitions and transitions for new role assignments
    Identify what privilege escalation is, including the use of sudo and auditing its use
    Outline what service accounts are and the types of windows service accounts
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 35s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 11s
    Upon completion of this video, you will be able to outline the purpose of rule-based access control. FREE ACCESS
  • Locked
    3.  Role-based Access Control (RBAC)
    2m 34s
    After completing this video, you will be able to recognize role-based access control (RBAC) concepts. FREE ACCESS
  • Locked
    4.  Working with Discretionary Access Controls (DAC)
    3m 16s
    In this video, you will explore examples of working with discretionary access control (DAC). FREE ACCESS
  • Locked
    5.  Mandatory Access Control (MAC)
    5m 8s
    Through this video, you will be able to identify what mandatory access control (MAC) is. FREE ACCESS
  • Locked
    6.  Attribute-based vs. Risk-based Access Control
    3m 40s
    In this video, we will differentiate between attribute-based access control (ABAC) and risk-based access control (RBAC). FREE ACCESS
  • Locked
    7.  Access Policy Enforcement
    2m 9s
    Upon completion of this video, you will be able to outline access policy enforcement, including policy decision points and policy enforcement points. FREE ACCESS
  • Locked
    8.  Account Access Review
    2m 48s
    After completing this video, you will be able to identify account access review details for a user, system, and service. FREE ACCESS
  • Locked
    9.  Provisioning and Deprovisioning
    3m 51s
    In this video, we will differentiate provisioning and deprovisioning and onboarding/offboarding. FREE ACCESS
  • Locked
    10.  Role Definitions and Transitions
    2m 58s
    Through this video, you will be able to recognize role definitions and transitions for new role assignments. FREE ACCESS
  • Locked
    11.  Privilege Escalation
    2m 8s
    Upon completion of this video, you will be able to identify what privilege escalation is, including the use of sudo and auditing its use. FREE ACCESS
  • Locked
    12.  Service Accounts Management
    2m 58s
    After completing this video, you will be able to outline what service accounts are and the types of Windows service accounts. FREE ACCESS
  • Locked
    13.  Course Summary
    38s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 64 users Rating 4.6 of 64 users (64)
Rating 4.4 of 8 users Rating 4.4 of 8 users (8)
Rating 4.9 of 24 users Rating 4.9 of 24 users (24)