Course details
With the increasing growth of the Internet and networks in general being used for business, security is an important issue. A key aspect of business security is controlling which users have access to what resources, and which operations they can perform. The mechanism for controlling these aspects is Access Control. This courses examines how to determine appropriate access controls, architecture models, authentication techniques and access methods. It explains access control systems, their differences and implementations and how they protect services and data. This course also demonstrates attack methods used to bypass access control systems and describes account management procedures and key access control concepts. The course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.
- identify the most appropriate access controls for particular situations
- recognize the considerations for access control subjects and access control objects
- select appropriate access control architecture models for particular situations
- recognize access control architecture models
- determine the most appropriate access controls to use in a particular scenario
- determine the most appropriate access control architecture model to use in a particular scenario
- describe knowledge and ownership based authentication methods
- describe the components of an identity management solution
- describe characteristics-based authentication methods
- describe multifactor authentication methods
- recognize the advantages of single sign-on systems (SSOs) for authentication
- describe how Kerberos is used for authentication
- select the most appropriate access control methodology to use in a particular situation
- rank portable devices according to the amount of data they can remove from a network
- describe security risks and mitigation techniques for virtual platforms
- describe the phases of a cloud computing data cycle
- determine the most appropriate authentication technique to use in a particular scenario
- determine the most appropriate access method to implement in a particular scenario
About New Horizons Jordan
- 300 computer training centers in 70 countries (and counting)
- Largest Guaranteed-to-Run ctheirse schedule in the world
- Ranked in the top 5% of the industry for training quality and customer satisfaction
- Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
- Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
- World’s largest Cisco-authorized training partner
Networking and Security Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Security Management Officer JanetsAED 37Duration: Upto 2 Weeks
- Cyber Security Law Academy for Health & FitnessAED 46Duration: Upto 4 Hours