CISSP 2013 Domain: Access Control New Horizons Jordan
Price: TBA
  • Duration: 2 Hours

Course details

This course focuses on the need for access control mechanisms to secure an organization's network and minimize its vulnerability to attacks or intrusion. It covers various access control models, techniques, mechanisms, and methodologies. You will learn about the latest in authentication strategies and intrusion detection and prevention techniques. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains. The CISSP credential certifies student expertise in ten different knowledge domains.

  • identify the types of access control technologies used in a networking environment
  • identify critical activities related to information classification
  • identify knowledge-based authentication technologies
  • identify characteristics-based authentication technologies
  • recognize how single sign-on systems (SSOs) are used for authentication
  • recognize how one-time passwords (OTPs) and smart cards are used for authentication
  • recognize ways of securing passwords
  • identify different types of attack against passwords and password files
  • determine the appropriate type of authentication to implement in a given enterprise scenario
  • evaluate given passwords
  • recognize appropriate access control models given a scenario
  • identify the features of the DAC and MAC access control models
  • recognize how different types of access control technique control access to resources
  • identify the advantages and disadvantages of centralized and decentralized identity management systems
  • identify intrusion detection system (IDS) mechanisms and implementation methods
  • identify intrusion detection and prevention techniques
  • determine the most appropriate access control model to implement in a given scenario
  • recognize access control and intrusion detection techniques
Updated on 19 February, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISSP starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or