Authorization & Registration

  • 17 Videos | 1h 29m 44s
  • Includes Assessment
  • Earns a Badge
Likes 3 Likes 3
Without the ability to gain entry, hackers are powerless. Explore key authentication concepts and best practices like identification, user authentication, the user logon process, and how to effectively manage user account credentials.

WHAT YOU WILL LEARN

  • describe characteristics of the authentication and identification process and the relationship between them
    distinguish between the three user authentication components and how they interrelate
    distinguish between the different types of authentication
    describe characteristics of authorization
    identify the phases of the user logon process
    identify characteristics and purpose of credentials
    identify characteristics of password credentials
    identify characteristics of asymmetric key credentials for authentication
    identify characteristics of biometric credentials
  • identify characteristics of ticket-based hybrid authentication credentials
    describe characteristics and purpose of secure user account registration policies and practices
    describe best practices for secure usernames and user identifiers
    identify best practices for account registration verification
    identify best practices and purpose of using CAPTCHA for user account registration and set-up
    describe purpose and best practices for implementing two-step verification in user account registration policies
    describe best practices for preventing username enumeration as part of user account registration security
    identify appropriate user account registration and password best practices

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE