• Online, Self-Paced
Course Description

Access controls are the modern-day security guards of your overall systems and network. In this course, you will learn about authentication mechanisms including single and multifactor authentication. You'll also learn about trust architectures, including one-way, two-way, and transitive trust relationships. This course also covers the identity management life cycle, and specific access controls such as mandatory, non-discretionary, role-based, and attribute-based controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Learning Objectives

Implementing Authentication Mechanisms

  • start the course
  • identify characteristics of authentication and the role it plays in access control
  • describe best practices for implementing single/multifactor authentication
  • describe best practices for implementing single sign-on authentication
  • identify best practices for implementing device authentication

Operating Internetwork Trust Architectures

  • describe characteristics of one-way trust relationships in internetwork trust architectures
  • describe characteristics of two-way trust relationships in internetwork trust architectures
  • identify characteristics of transitive trust in internetwork trust architectures

Identity Management Life Cycle Activities

  • describe characteristics of authorization as part of the identity management life cycle
  • identify proofing best practices during the identity management life cycle
  • describe provisioning activities as part of the identity management life cycle
  • identify maintenance best practices during the identity management life cycle
  • describe entitlement activities during the identity management life cycle

Implementing Access Controls

  • describe best practices when implementing mandatory access control
  • describe best practices when implementing non-discretionary access control
  • describe best practices when implementing discretionary access control
  • describe best practices when implementing role-based access control
  • describe best practices when implementing attribute-based access control

Practice: Implementing Access Controls

  • identify appropriate access controls and best practices for implementation

Framework Connections