Access Control - SSCP

Access Control - SSCP

Cours
en
Anglais
15 h
Ce contenu est noté 0 sur 5
Source
  • Sur www.coursera.org
Conditions
  • À son rythme
  • Accès libre
  • Certificat payant
Plus d'informations
  • Niveau Introductif

Their employees are learning daily with Edflex

  • Safran
  • Air France
  • TotalEnergies
  • Generali
Découvrir Edflex

Détails du cours

Déroulé

WEEK 1: Implement Authentication Mechanisms
Module Topics: Single Factor/Multifactor Authentication, Biometrics. In Single Factor/ Multifactor Authentication, you will learn about identity, methods, registration of new users, periodic review of access levels, clearance, authentication, knowledge, password reset, mass lockouts, ownership, and characteristics.
In Biometrics, you will learn about biometrics, behavioral biometrics, physiological biometrics, biometric implementation issues, biometric accuracy, physiological use as identification, next-generation identification (NGI) database, department of defense (DoD) electronic biometric transmission specification (EBTS), and biometric standards development.

WEEK 2: Implement Authentication Mechanisms
Module Topics: Tokens, Single Sign-On, Offline and Device Authentication.
In Tokens, you will learn about uses of token information, time-synchronized one-time passwords, mathematical-algorithm based one time passwords, physical types, disconnected tokens, connected tokens, contactless tokens, bluetooth and mobile device tokens, smart cards, types of smart card technology, smart card applications, multifactor authentication, two-factor vs. three-factor authentication, dual control, continuous authentication, periodic authentication, time outs, reverse authentication, certificate-based authentication, authorization, access to systems vs. data, network, access control lists/matrix, and directories. In Single Sign-On, you will learn about SSO risks, SSO implementation: kerberos, Kerberos applications, Kerberos process, Kerberos considerations, Kerberos tools, Klist purge, Server 2012/(R2) and Windows 8/8.1 features, and network ports used during Kerberos authentication. In Offline and Device Authentication, you will learn about types of authentication.

WEEK 3: Operate Internetwork Trust Architectures
Module Topics: Comparing Internetwork Architectures, One-way Trust, Two-way Trust, and Transitive Trust. In Comparing Internetwork Architectures, you will learn about typical DMZ design, trust path. In Trust, you will learn about one-way trust, two-way trust, and transitive trust.

WEEK 4: Administer Identity Management Life Cycle
Module Topics: Identity Management, Authorization, Proofing, Provisioning, Maintenance, and Entitlement.
In Identity management, you will learn about identity management cycle. You will also learn about, authorization, proofing, provisioning, and maintenance. In Entitlement, you will learn about entities, entitlement defined.

WEEK 5: Implement Access Controls
Module Topics: Mandatory Access Control (MAC), Non-Discretionary Access Control, Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Content Dependent, Context-Based, Temporal Isolation (Time Based), Attribute-Based, Separation of Duties, Security Architecture and Models.
You will learn about Mandatory Access Control (MAC), and Non-Discretionary Access Control, In Discretionary Access Control (DAC), you will learn about Rule Set-Based Access Controls (RSBAC), RSBAC GFAC logic for data access request. In Role -Based Access Control (RBAC), you will learn about role hierarchies, constrained user interface (CUI), types of restricted interfaces, view-based access control (VBAC), and VBAC examples. You will also learn about Content-Dependent Access Control (CDAC), and Temperoal isolation (Time-Based) Access Control. In Attribute-based Access Control (ABAC), you will learn about key terms. In Security Architecture and Models, you will learn about Bell-LaPadula confidentiality Model, Biba integrity model, BLP and Biba model comparison, Clark-Wilson integrity model, and additional models,

WEEK 6: Case Study
This assignment is based on a case study that will require the student to put into practice the knowledge they have gained through the course. It requires the basic understanding of the topics and the ability to relate those topics to the real world. The objective of review is to determine whether the student has understood the concepts and has performed the necessary analysis to ensure a complete and thorough answer.

WEEK 7: Exam

Prérequis

None

Intervenants

(ISC)² Education & Training

Éditeur

(ISC)²: The World’s Leading Cybersecurity Professional Organization

Plateforme

Coursera est une entreprise numérique proposant des formations en ligne ouverte à tous fondée par les professeurs d'informatique Andrew Ng et Daphne Koller de l'université Stanford, située à Mountain View, Californie.

Ce qui la différencie le plus des autres plateformes MOOC, c'est qu'elle travaille qu'avec les meilleures universités et organisations mondiales et diffuse leurs contenus sur le web.

Ce contenu est noté 4.5 sur 5
(aucun avis)
Ce contenu est noté 4.5 sur 5
(aucun avis)
Complétez cette ressource pour donner votre avis