5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Systems Security Certified Practitioner 2021
Whether you manage one or thousands of digital identities, the expectation for regulatory compliance, top-level security, and speedy access control will be the same. The importance of access control is reinforced by Domain 2 of the SSCP exam, representing 15% of the overall subject matter. Among other topics, this domain covers the identity management lifecycle and access control models.
Use this course to gain a clear comprehension of the various aspects of identity management, namely authorization, proofing, provisioning, de-provisioning, maintenance, and entitlement.
Furthermore, explore several types of access control models, including role-based and rule-based, and investigate the Bell-LaPadula and Biba mandatory access confidentiality and integrity models.
Upon course completion, you'll recognize the identity management and access control techniques needed in your organization. You'll also be further prepared to sit the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

Objectives

SSCP 2021: Identity Management & Access Control Models

  • discover the key concepts covered in this course
  • summarize the authorization aspect of identity management and distinguish it from authentication
  • describe the proofing aspect of identity management and outline the NIST proofing requirement
  • describe the provisioning and de-provisioning aspects of identity management and name examples of automated provisioning services
  • summarize the maintenance aspect of identity management and outline two samples of an identity management lifecycle
  • outline the entitlement aspect of identity management and describe potential tasks involved
  • illustrate the AWS IAM services for identity and access management
  • compare several types of access control models, namely mandatory, discretionary, role-based, and rule-based
  • define the Bell-LaPadula and Biba access control models
  • summarize the key concepts covered in this course