Course Details

Previous Page


Systems Security Certified Practitioner: Access Controls


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Access controls are the modern-day security guards of your overall systems and network. In this course, you will learn about authentication mechanisms including single and multifactor authentication. You'll also learn about trust architectures, including one-way, two-way, and transitive trust relationships. This course also covers the identity management life cycle, and specific access controls such as mandatory, non-discretionary, role-based, and attribute-based controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Target Audience
Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisites
None

Expected Duration (hours)
1.0

Lesson Objectives

Systems Security Certified Practitioner: Access Controls

  • start the course
  • identify characteristics of authentication and the role it plays in access control
  • describe best practices for implementing single/multifactor authentication
  • describe best practices for implementing single sign-on authentication
  • identify best practices for implementing device authentication
  • describe characteristics of one-way trust relationships in internetwork trust architectures
  • describe characteristics of two-way trust relationships in internetwork trust architectures
  • identify characteristics of transitive trust in internetwork trust architectures
  • describe characteristics of authorization as part of the identity management life cycle
  • identify proofing best practices during the identity management life cycle
  • describe provisioning activities as part of the identity management life cycle
  • identify maintenance best practices during the identity management life cycle
  • describe entitlement activities during the identity management life cycle
  • describe best practices when implementing mandatory access control
  • describe best practices when implementing non-discretionary access control
  • describe best practices when implementing discretionary access control
  • describe best practices when implementing role-based access control
  • describe best practices when implementing attribute-based access control
  • identify appropriate access controls and best practices for implementation
  • Course Number:
    sp_sscp_a01_it_enus