System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
Intermediate
- 14 videos | 59m 53s
- Includes Assessment
- Earns a Badge
This 14-video course explores common methods and uses real-world examples for providing resource access after authentication. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining defense in depth, a security term for multiple layers of security. You will learn about Discretionary Access Control, where the resource owner sets the permissions. You will learn how to use the Windows command line to manage a Windows file system access control list, and you will examine MAC (mandatory access control). You will learn to modify the default file system access control permissions on a Linux host using umask. You will examine RBAC (role-based access control). You will learn to use Microsoft PowerShell to assign permissions to a Windows group. You will learn to assign permissions to a group in Linux, and how to modify the default file system access control permissions on a Linux host by using umask. You will learn to configure Attribute-based Access Control in Windows, and object-level access control. Finally, learners will examine NAC (network access control).
WHAT YOU WILL LEARN
-
Describe how authorization follows authentication to allow resource accessCompare and contrast dac with macUse the icacls command to configure dacCompare and contrast dac with macSet the linux umask to control default permissionsList the benefits of using rbacUse the powershell set-acl cmdlet to configure rbac
-
Use linux to configure rbacCompare attribute-based ac to dac and macUse windows to configure abacDiscuss alternate access control methodsSpecify when 802.1x remediation, quarantine, and admission should be configured for thin clients, vpns, and teleworkersApply access control techniques to secure assets
IN THIS COURSE
-
1m 39s
-
4m 28s
-
2m 50sIn this video, you will compare and contrast DAC with MAC. FREE ACCESS
-
6m 19sIn this video, find out how to use the icacls command to configure discretionary access control. FREE ACCESS
-
3m 15sFind out how to compare and contrast a DAC with a MAC. FREE ACCESS
-
5m 22sTo find out how to set the Linux umask to control default permissions, consult a search engine or a Linux forum. FREE ACCESS
-
3m 54sAfter watching this video, you will be able to list the benefits of using RBAC. FREE ACCESS
-
4m 45sIn this video, you will learn how to use the PowerShell Set-Acl cmdlet to configure role-based access control. FREE ACCESS
-
2m 41sDuring this video, you will learn how to configure RBAC using Linux. FREE ACCESS
-
4m 5sFind out how to compare attribute-based access control to discretionary access control and mandatory access control. FREE ACCESS
-
8m 17sIn this video, you will use Windows to configure Attribute Based Access Control. FREE ACCESS
-
1m 45sIn this video, you will learn how to discuss alternative access control methods. FREE ACCESS
-
4m 5sUpon completion of this video, you will be able to specify when 802.1x remediation, quarantine, and admission should be configured for thin clients, VPNs, and teleworkers. FREE ACCESS
-
6m 30sDuring this video, you will learn how to apply access control techniques to secure assets. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.