Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SSCP Cert Prep: 2 Access Controls

Description

Prepare for Systems Security Certified Practitioner certification (SSCP). Review the Access Controls domain objectives including identification, authorization, and authentication.

Tags

Syllabus

Syllabus IntroductionControl accessWhat you need to knowStudy resources1. Identity and Access ManagementAccess controlsIdentification, authentication, and authorization2. IdentificationUsernames and access cardsBiometricsRegistration and identity proofing3. AuthenticationAuthentication factorsMultifactor authenticationSomething you havePassword authentication protocolsSSO and federationInternetwork trust architecturesZero-trust network architecturesSAMLOAuth and OpenID ConnectDevice authentication4. Identity Management LifecycleUnderstand account and privilege managementAccount policiesPassword policiesManage rolesAccount monitoringProvisioning and deprovisioning5. AuthorizationUnderstand authorizationMandatory access controlsDiscretionary access controlsAccess control listsAdvanced authorization conceptsConclusionContinuing your studies Read more


SSCP Cert Prep: 2 Access Controls

Affiliate notice

Prepare for Systems Security Certified Practitioner certification (SSCP). Review the Access Controls domain objectives including identification, authorization, and authentication.

Syllabus IntroductionControl accessWhat you need to knowStudy resources1. Identity and Access ManagementAccess controlsIdentification, authentication, and authorization2. IdentificationUsernames and access cardsBiometricsRegistration and identity proofing3. AuthenticationAuthentication factorsMultifactor authenticationSomething you havePassword authentication protocolsSSO and federationInternetwork trust architecturesZero-trust network architecturesSAMLOAuth and OpenID ConnectDevice authentication4. Identity Management LifecycleUnderstand account and privilege managementAccount policiesPassword policiesManage rolesAccount monitoringProvisioning and deprovisioning5. AuthorizationUnderstand authorizationMandatory access controlsDiscretionary access controlsAccess control listsAdvanced authorization conceptsConclusionContinuing your studies Read more