System Security Certified Practitioner (SSCP 2018): Controlling Resource Access

Intermediate
  • 14 videos | 59m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
This 14-video course explores common methods and uses real-world examples for providing resource access after authentication. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining defense in depth, a security term for multiple layers of security. You will learn about Discretionary Access Control, where the resource owner sets the permissions. You will learn how to use the Windows command line to manage a Windows file system access control list, and you will examine MAC (mandatory access control). You will learn to modify the default file system access control permissions on a Linux host using umask. You will examine RBAC (role-based access control). You will learn to use Microsoft PowerShell to assign permissions to a Windows group. You will learn to assign permissions to a group in Linux, and how to modify the default file system access control permissions on a Linux host by using umask. You will learn to configure Attribute-based Access Control in Windows, and object-level access control. Finally, learners will examine NAC (network access control).

WHAT YOU WILL LEARN

  • Describe how authorization follows authentication to allow resource access
    Compare and contrast dac with mac
    Use the icacls command to configure dac
    Compare and contrast dac with mac
    Set the linux umask to control default permissions
    List the benefits of using rbac
    Use the powershell set-acl cmdlet to configure rbac
  • Use linux to configure rbac
    Compare attribute-based ac to dac and mac
    Use windows to configure abac
    Discuss alternate access control methods
    Specify when 802.1x remediation, quarantine, and admission should be configured for thin clients, vpns, and teleworkers
    Apply access control techniques to secure assets

IN THIS COURSE

  • 1m 39s
  • 4m 28s
  • Locked
    3.  Discretionary Access Control
    2m 50s
    In this video, you will compare and contrast DAC with MAC. FREE ACCESS
  • Locked
    4.  Configure a Windows File System DACL
    6m 19s
    In this video, find out how to use the icacls command to configure discretionary access control. FREE ACCESS
  • Locked
    5.  Mandatory Access Control
    3m 15s
    Find out how to compare and contrast a DAC with a MAC. FREE ACCESS
  • Locked
    6.  Linux umask Permissions
    5m 22s
    To find out how to set the Linux umask to control default permissions, consult a search engine or a Linux forum. FREE ACCESS
  • Locked
    7.  Role-Based Access Control
    3m 54s
    After watching this video, you will be able to list the benefits of using RBAC. FREE ACCESS
  • Locked
    8.  Assign Permissions to a Windows Group
    4m 45s
    In this video, you will learn how to use the PowerShell Set-Acl cmdlet to configure role-based access control. FREE ACCESS
  • Locked
    9.  Assign Permissions to a Linux Group
    2m 41s
    During this video, you will learn how to configure RBAC using Linux. FREE ACCESS
  • Locked
    10.  Attribute-Based Access Control
    4m 5s
    Find out how to compare attribute-based access control to discretionary access control and mandatory access control. FREE ACCESS
  • Locked
    11.  Configure Attribute-based Access Control in Windows
    8m 17s
    In this video, you will use Windows to configure Attribute Based Access Control. FREE ACCESS
  • Locked
    12.  Object-Level Access Control
    1m 45s
    In this video, you will learn how to discuss alternative access control methods. FREE ACCESS
  • Locked
    13.  Control Network Access
    4m 5s
    Upon completion of this video, you will be able to specify when 802.1x remediation, quarantine, and admission should be configured for thin clients, VPNs, and teleworkers. FREE ACCESS
  • Locked
    14.  Exercise: Implement Access Control Mechanisms
    6m 30s
    During this video, you will learn how to apply access control techniques to secure assets. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 34 users Rating 4.6 of 34 users (34)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)