SSCP 2021: Identity Management & Access Control Models

SSCP    |    Intermediate
  • 10 videos | 40m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 66 users Rating 4.4 of 66 users (66)
Whether you manage one or thousands of digital identities, the expectation for regulatory compliance, top-level security, and speedy access control will be the same. The importance of access control is reinforced by Domain 2 of the SSCP exam, representing 15% of the overall subject matter. Among other topics, this domain covers the identity management lifecycle and access control models. Use this course to gain a clear comprehension of the various aspects of identity management, namely authorization, proofing, provisioning, de-provisioning, maintenance, and entitlement. Furthermore, explore several types of access control models, including role-based and rule-based, and investigate the Bell-LaPadula and Biba mandatory access confidentiality and integrity models. Upon course completion, you'll recognize the identity management and access control techniques needed in your organization. You'll also be further prepared to sit the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Summarize the authorization aspect of identity management and distinguish it from authentication
    Describe the proofing aspect of identity management and outline the nist proofing requirement
    Describe the provisioning and de-provisioning aspects of identity management and name examples of automated provisioning services
    Summarize the maintenance aspect of identity management and outline two samples of an identity management lifecycle
  • Outline the entitlement aspect of identity management and describe potential tasks involved
    Illustrate the aws iam services for identity and access management
    Compare several types of access control models, namely mandatory, discretionary, role-based, and rule-based
    Define the bell-lapadula and biba access control models
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 51s
  • 3m 26s
  • Locked
    3.  The Role of Proofing in Identity Management
    4m 39s
  • Locked
    4.  Identity Provisioning and De-provisioning Activities
    3m 21s
  • Locked
    5.  The Role of Maintenance in Identity Management
    3m 21s
  • Locked
    6.  The Role of Entitlement in Identity Management
    1m 50s
  • Locked
    7.  Using IAM Systems for Managing Identities and Access
    9m 25s
  • Locked
    8.  Types of Access Control Models
    7m 15s
  • Locked
    9.  The Bell-LaPadula and Biba Access Control Models
    4m 37s
  • Locked
    10.  Course Summary
    42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.5 of 245 users Rating 4.5 of 245 users (245)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 53 users Rating 4.5 of 53 users (53)
Rating 4.6 of 170 users Rating 4.6 of 170 users (170)
Rating 4.3 of 20 users Rating 4.3 of 20 users (20)