Certified in Cybersecurity (CC): Logical Access Controls

Cybersecurity    |    Beginner
  • 9 videos | 20m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
There is often a blurred line between physical and logical access control, as the systems typically function together. In this course, you will explore the logical aspect of Defense in Depth and security controls. Next, you will examine discretionary access control (DAC) and mandatory access control (MAC). Finally, you will define role-based access control (RBAC), rule-based access control (RuBAC), and attribute-based access control (ABAC) and learn about their differences. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Summarize the key concepts covered in this course
    Define logical access controls, such as passwords, software multi-factor authentication, and identity management systems
    Describe logical defense in depth, for example multiple engines processing packets in a particular order on a physical or virtual firewall appliance or system
    Define discretionary access controls such as those found in active directory or azuread
    Define mandatory access controls used in highly secure environments like military or intelligence agencies
  • Define role-based access controls which are often built into database management systems
    Define rule-based access controls, such as infrastructure access control lists (acls) and network acls
    Describe zero trust environments that shift the security perimeter from the corporate edge component to each individual subject
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 52s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS
  • 1m 21s
    After completing this video, you will be able to define logical access controls, such as passwords, software multi-factor authentication, and identity management systems. FREE ACCESS
  • Locked
    3.  Logical Defense in Depth
    2m 11s
    Upon completion of this video, you will be able to describe logical Defense in Depth, for example multiple engines processing packets in a particular order on a physical or virtual firewall appliance or system. FREE ACCESS
  • Locked
    4.  Discretionary Access Control (DAC)
    2m 28s
    After completing this video, you will be able to define discretionary access controls such as those found in Active Directory or AzureAD. FREE ACCESS
  • Locked
    5.  Mandatory Access Control (MAC)
    3m 49s
    Upon completion of this video, you will be able to define mandatory access controls used in highly secure environments like military or intelligence agencies. FREE ACCESS
  • Locked
    6.  Role-based Access Control (RBAC)
    2m 35s
    In this video, we will define role-based access controls which are often built into database management systems. FREE ACCESS
  • Locked
    7.  Rule-based Access Control (RuBAC)
    3m 19s
    After completing this video, you will be able to define rule-based access controls, such as infrastructure access control lists (ACLs) and network ACLs. FREE ACCESS
  • Locked
    8.  Attribute-based Access Control (ABAC)
    3m 9s
    Upon completion of this video, you will be able to describe zero trust environments that shift the security perimeter from the corporate edge component to each individual subject. FREE ACCESS
  • Locked
    9.  Course Summary
    33s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 56 users Rating 4.6 of 56 users (56)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 311 users Rating 4.6 of 311 users (311)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)