SSCP Domain: Access Controls New Horizons Jordan
Price: TBA
  • Duration: 3 Hours

Course details

With the increasing growth of the Internet and networks in general being used for business, security is an important issue. A key aspect of business security is controlling which users have access to what resources, and which operations they can perform. The mechanism for controlling these aspects is Access Control. This courses examines how to determine appropriate access controls, architecture models, authentication techniques and access methods. It explains access control systems, their differences and implementations and how they protect services and data. This course also demonstrates attack methods used to bypass access control systems and describes account management procedures and key access control concepts. The course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.

  • identify the most appropriate access controls for particular situations
  • recognize the considerations for access control subjects and access control objects
  • select appropriate access control architecture models for particular situations
  • recognize access control architecture models
  • determine the most appropriate access controls to use in a particular scenario
  • determine the most appropriate access control architecture model to use in a particular scenario
  • describe knowledge and ownership based authentication methods
  • describe the components of an identity management solution
  • describe characteristics-based authentication methods
  • describe multifactor authentication methods
  • recognize the advantages of single sign-on systems (SSOs) for authentication
  • describe how Kerberos is used for authentication
  • select the most appropriate access control methodology to use in a particular situation
  • rank portable devices according to the amount of data they can remove from a network
  • describe security risks and mitigation techniques for virtual platforms
  • describe the phases of a cloud computing data cycle
  • determine the most appropriate authentication technique to use in a particular scenario
  • determine the most appropriate access method to implement in a particular scenario
Updated on 09 November, 2015

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on Networking and Security starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or