CompTIA Cybersecurity Analyst+: Authorization

Cybersecurity    |    Intermediate
  • 9 videos | 52m 1s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Strong authorization settings limit permissions to resources for authenticated entities. Cybersecurity analysts must be aware of how to not only configure resource permissions, but also how to evaluate existing permissions to ensure adherence to the principle of least privilege. In this course, you will discover how authorization is related to, but differs from, authentication. Then you will explore access control models, such as role-based access control (RBAC) and attribute-based access control (ABAC). Next, you will find out how to manage Linux and Windows file system permissions using the command lines. Finally, you will learn how to configure Windows dynamic access control, work with privileged access management in Linux using sudo, and manage RBAC permissions in the Microsoft Azure cloud. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define authorization and describe how it differs from authentication
    Describe access control models such as role-based access control (rbac) and attribute-based access control (abac)
    Manage linux file system permissions
    Manage windows file system permissions
  • Create an attribute-based dynamic group
    Limit privileged permissions on a linux system
    Configure role-based access control permissions in the microsoft azure cloud
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 7s
    After completing this video, you will be able to define authorization and describe how it differs from authentication. FREE ACCESS
  • Locked
    3.  Access Control Models
    6m 9s
    Upon completion of this video, you will be able to describe access control models such as role-based access control (RBAC) and attribute-based access control (ABAC). FREE ACCESS
  • Locked
    4.  Managing Linux File System Permissions
    6m 39s
    In this video, find out how to manage Linux file system permissions. FREE ACCESS
  • Locked
    5.  Managing Windows File System Permissions
    7m 18s
    Learn how to manage Windows file system permissions. FREE ACCESS
  • Locked
    6.  Configuring Windows Dynamic Access Control
    10m 49s
    During this video, discover how to create an attribute-based dynamic group. FREE ACCESS
  • Locked
    7.  Privileged Access Management and sudo
    7m 16s
    Find out how to limit privileged permissions on a Linux system. FREE ACCESS
  • Locked
    8.  Managing Cloud RBAC Permissions
    5m 50s
    In this video, you will learn how to configure role-based access control permissions in the Microsoft Azure cloud. FREE ACCESS
  • Locked
    9.  Course Summary
    46s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.4 of 7 users Rating 4.4 of 7 users (7)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)