CRISC 2023: Authorization

CRISC    |    Intermediate
  • 10 videos | 53m 29s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Strong authorization settings limit permissions to resources for authenticated entities. Cybersecurity analysts must be aware of how to not only configure resource permissions, but also how to evaluate existing permissions to ensure adherence to the principle of least privilege. In this course, you will discover how authorization is related to, but differs from, authentication. Then, you will explore access control models, such as role-based access control (RBAC) and attribute-based access control (ABAC). Next, you will find out how to manage Linux and Windows file system permissions using the command lines. Finally, you will learn how to configure Windows dynamic access control, work with privileged access management in Linux using sudo, and manage RBAC permissions in the Microsoft Azure cloud. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define authorization and describe how it differs from authentication
    Outline access control models such as role-based access control (rbac) and attribute-based access control (abac)
    Manage linux file system permissions
    Manage windows file system permissions
  • Create an attribute-based dynamic group
    Limit privileged permissions on a linux system
    Configure rbac permissions in the microsoft azure cloud
    Configure cloud resource-managed identities to control cloud resource access
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 13s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 56s
    After completing this video, you will be able to define authorization and describe how it differs from authentication. FREE ACCESS
  • Locked
    3.  Access Control Models
    6m 30s
    Upon completion of this video, you will be able to outline access control models such as Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC). FREE ACCESS
  • Locked
    4.  Managing Linux File System Permissions
    7m 15s
    In this video, find out how to manage Linux file system permissions. FREE ACCESS
  • Locked
    5.  Managing Windows File System Permissions
    6m 50s
    Learn how to manage Windows file system permissions. FREE ACCESS
  • Locked
    6.  Configuring Windows Dynamic Access Control
    6m 47s
    In this video, learn how to create an attribute-based dynamic group. FREE ACCESS
  • Locked
    7.  Privileged Access Management and sudo
    5m 15s
    Discover how to limit privileged permissions on a Linux system. FREE ACCESS
  • Locked
    8.  Managing Cloud RBAC Permissions
    7m 19s
    Find out how to configure RBAC permissions in the Microsoft Azure cloud. FREE ACCESS
  • Locked
    9.  Microsoft Azure Managed Identities
    5m 31s
    In this video, discover how to configure cloud resource-managed identities to control cloud resource access. FREE ACCESS
  • Locked
    10.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 296 users Rating 4.6 of 296 users (296)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 3027 users Rating 4.5 of 3027 users (3027)