Course details
This course focuses on the need for access control mechanisms to secure an organization's network and minimize its vulnerability to attacks or intrusion. It covers various access control models, techniques, mechanisms, and methodologies. You will learn about the latest in authentication strategies and intrusion detection and prevention techniques. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains. The CISSP credential certifies student expertise in ten different knowledge domains.
- identify the types of access control technologies used in a networking environment
- identify critical activities related to information classification
- identify knowledge-based authentication technologies
- identify characteristics-based authentication technologies
- recognize how single sign-on systems (SSOs) are used for authentication
- recognize how one-time passwords (OTPs) and smart cards are used for authentication
- recognize ways of securing passwords
- identify different types of attack against passwords and password files
- determine the appropriate type of authentication to implement in a given enterprise scenario
- evaluate given passwords
- recognize appropriate access control models given a scenario
- identify the features of the DAC and MAC access control models
- recognize how different types of access control technique control access to resources
- identify the advantages and disadvantages of centralized and decentralized identity management systems
- identify intrusion detection system (IDS) mechanisms and implementation methods
- identify intrusion detection and prevention techniques
- determine the most appropriate access control model to implement in a given scenario
- recognize access control and intrusion detection techniques
About New Horizons Jordan
- 300 computer training centers in 70 countries (and counting)
- Largest Guaranteed-to-Run ctheirse schedule in the world
- Ranked in the top 5% of the industry for training quality and customer satisfaction
- Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
- Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
- World’s largest Cisco-authorized training partner
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- GDPR Data Protection Alpha AcademyUSD 25
USD 480Duration: Upto 4 Hours - GDPR : 7 Professional Bundle JanetsUSD 63Duration: Upto 12 Weeks