5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Systems Security Certified Practitioner
Access controls are the modern-day security guards of your overall systems and network. In this course, you will learn about authentication mechanisms including single and multifactor authentication. You'll also learn about trust architectures, including one-way, two-way, and transitive trust relationships. This course also covers the identity management life cycle, and specific access controls such as mandatory, non-discretionary, role-based, and attribute-based controls. This course is one of a series in the learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Objectives

Implementing Authentication Mechanisms

  • start the course
  • identify characteristics of authentication and the role it plays in access control
  • describe best practices for implementing single/multifactor authentication
  • describe best practices for implementing single sign-on authentication
  • identify best practices for implementing device authentication

Operating Internetwork Trust Architectures

  • describe characteristics of one-way trust relationships in internetwork trust architectures
  • describe characteristics of two-way trust relationships in internetwork trust architectures
  • identify characteristics of transitive trust in internetwork trust architectures

Identity Management Life Cycle Activities

  • describe characteristics of authorization as part of the identity management life cycle
  • identify proofing best practices during the identity management life cycle
  • describe provisioning activities as part of the identity management life cycle
  • identify maintenance best practices during the identity management life cycle
  • describe entitlement activities during the identity management life cycle

Implementing Access Controls

  • describe best practices when implementing mandatory access control
  • describe best practices when implementing non-discretionary access control
  • describe best practices when implementing discretionary access control
  • describe best practices when implementing role-based access control
  • describe best practices when implementing attribute-based access control

Practice: Implementing Access Controls

  • identify appropriate access controls and best practices for implementation