CISSP 2024: Authorization Mechanisms & Identity Management
CISSP 2024
| Expert
- 13 videos | 35m 52s
- Includes Assessment
- Earns a Badge
While authentication is technically mandatory, authorization is optional, and if all principals had root or administrative access in a small organization, there would be no need for different access layers. This scenario, however, is quite rare and is a violation of modern identity management and zero-trust initiatives. In this course, learn about the implementation and management of authorization mechanisms and control of the identity and access provisioning lifecycle, including rule-based, role-based, discretionary, mandatory, attribute-based, and risk-based access controls. Next, compare attribute-based access control (ABAC) with RBAC and explore access policy enforcement, account access review, and provisioning/deprovisioning. Finally, examine role definitions and transitions, privilege escalation, and service accounts management. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the purpose of rule-based access controlRecognize role-based access control (rbac) conceptsExplore examples of working with discretionary access control (dac)Identify what mandatory access control (mac) isDifferentiate between attribute-based access control (abac) and risk-based access control (rbac)Outline access policy enforcement, including policy decision points and policy enforcement points
-
Identify account access review details for a user, system, and serviceDifferentiate provisioning and deprovisioning and onboarding/offboardingRecognize role definitions and transitions for new role assignmentsIdentify what privilege escalation is, including the use of sudo and auditing its useOutline what service accounts are and the types of windows service accountsSummarize the key concepts covered in this course
IN THIS COURSE
-
35sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
3m 11sUpon completion of this video, you will be able to outline the purpose of rule-based access control. FREE ACCESS
-
2m 34sAfter completing this video, you will be able to recognize role-based access control (RBAC) concepts. FREE ACCESS
-
3m 16sIn this video, you will explore examples of working with discretionary access control (DAC). FREE ACCESS
-
5m 8sThrough this video, you will be able to identify what mandatory access control (MAC) is. FREE ACCESS
-
3m 40sIn this video, we will differentiate between attribute-based access control (ABAC) and risk-based access control (RBAC). FREE ACCESS
-
2m 9sUpon completion of this video, you will be able to outline access policy enforcement, including policy decision points and policy enforcement points. FREE ACCESS
-
2m 48sAfter completing this video, you will be able to identify account access review details for a user, system, and service. FREE ACCESS
-
3m 51sIn this video, we will differentiate provisioning and deprovisioning and onboarding/offboarding. FREE ACCESS
-
2m 58sThrough this video, you will be able to recognize role definitions and transitions for new role assignments. FREE ACCESS
-
2m 8sUpon completion of this video, you will be able to identify what privilege escalation is, including the use of sudo and auditing its use. FREE ACCESS
-
2m 58sAfter completing this video, you will be able to outline what service accounts are and the types of Windows service accounts. FREE ACCESS
-
38sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.