System Security Certified Practitioner (SSCP 2018): Controlling Resource Access

Intermediate
  • 14 Videos | 1h 5m 53s
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
This 14-video course explores common methods and uses real-world examples for providing resource access after authentication. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining defense in depth, a security term for multiple layers of security. You will learn about Discretionary Access Control, where the resource owner sets the permissions. You will learn how to use the Windows command line to manage a Windows file system access control list, and you will examine MAC (mandatory access control). You will learn to modify the default file system access control permissions on a Linux host using umask. You will examine RBAC (role-based access control). You will learn to use Microsoft PowerShell to assign permissions to a Windows group. You will learn to assign permissions to a group in Linux, and how to modify the default file system access control permissions on a Linux host by using umask. You will learn to configure Attribute-based Access Control in Windows, and object-level access control. Finally, learners will examine NAC (network access control).

WHAT YOU WILL LEARN

  • describe how authorization follows authentication to allow resource access
    compare and contrast DAC with MAC
    use the icacls command to configure DAC
    compare and contrast DAC with MAC
    set the Linux umask to control default permissions
    list the benefits of using RBAC
    use the PowerShell Set-Acl cmdlet to configure RBAC
  • use Linux to configure RBAC
    compare attribute-based AC to DAC and MAC
    use Windows to configure ABAC
    discuss alternate access control methods
    specify when 802.1x remediation, quarantine, and admission should be configured for thin clients, VPNs, and teleworkers
    apply access control techniques to secure assets

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 39s
    UP NEXT
  • Playable
    2. 
    Access Control Overview
    4m 28s
  • Locked
    3. 
    Discretionary Access Control
    2m 50s
  • Locked
    4. 
    Configure a Windows File System DACL
    6m 19s
  • Locked
    5. 
    Mandatory Access Control
    3m 15s
  • Locked
    6. 
    Linux umask Permissions
    5m 22s
  • Locked
    7. 
    Role-Based Access Control
    3m 54s
  • Locked
    8. 
    Assign Permissions to a Windows Group
    4m 45s
  • Locked
    9. 
    Assign Permissions to a Linux Group
    2m 41s
  • Locked
    10. 
    Attribute-Based Access Control
    4m 5s
  • Locked
    11. 
    Configure Attribute-based Access Control in Windows
    8m 17s
  • Locked
    12. 
    Object-Level Access Control
    1m 45s
  • Locked
    13. 
    Control Network Access
    4m 5s
  • Locked
    14. 
    Exercise: Implement Access Control Mechanisms
    6m 30s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.