CISM 2022: Implementing Access Control

CISM    |    Intermediate
  • 11 videos | 1h 2m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Authorization allows limited access to resources only after successful authentication. Resources can include IT services such as applications, databases, files, and folders, among others. In this course, explore the role authorization plays in allowing resource access and the various access control models used to ensure least privilege. Next, learn how to configure ABAC through Microsoft Dynamic Access Control, create an Azure dynamic group in the cloud, and use RBAC to grant permissions to Azure cloud resources. Finally, discover how to manage permissions for Windows and Linux-based file systems, handle Windows NTFS file system auditing, and configure Microsoft Active Directory delegated administration. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the role authorization plays in allowing resource access
    Recognize access control models used to ensure least privilege, such as abac, rbac, dac, and mac
    Use resource and active directory attributes to conditionally grant file system permissions
    Determine group memberships and permissions through user attributes
    Assign roles to the microsoft azure hierarchy
  • Implement dac with windows file system permissions
    Implement dac with linux file system permissions
    Configure auditing for windows file system events
    Use the control wizard delegation to enable others to manage ad objects
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 18s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 40s
    Upon completion of this video, you will be able to identify the role authorization plays in allowing resource access. FREE ACCESS
  • Locked
    3.  Access Control Models
    6m 17s
    After completing this video, you will be able to recognize access control models used to ensure least privilege, such as ABAC, RBAC, DAC, and MAC. FREE ACCESS
  • Locked
    4.  Configuring Windows Dynamic Access Control
    10m 30s
    In this video, you will learn how to use resource and Active Directory attributes to conditionally grant file system permissions. FREE ACCESS
  • Locked
    5.  Administering ABAC through Azure Dynamic Groups
    5m 40s
    In this video, you will determine group memberships and permissions through user attributes. FREE ACCESS
  • Locked
    6.  Using Azure Permissions through RBAC
    6m 31s
    Find out how to assign roles to the Microsoft Azure hierarchy. FREE ACCESS
  • Locked
    7.  Managing Windows File System Permissions
    6m 19s
    In this video, we will implement DAC with Windows file system permissions. FREE ACCESS
  • Locked
    8.  Handling Linux File System Permissions
    6m 58s
    During this video, discover how to implement DAC with Linux file system permissions. FREE ACCESS
  • Locked
    9.  Configuring Windows File System Auditing
    6m 19s
    Learn how to configure auditing for Windows file system events. FREE ACCESS
  • Locked
    10.  Using Active Directory Delegated Administration
    4m 31s
    In this video, find out how to use the control wizard delegation to enable others to manage AD objects. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 4s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 43 users Rating 4.3 of 43 users (43)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Rating 4.8 of 17 users Rating 4.8 of 17 users (17)