2015
Pluralsight
Jason Helmick
3:01
English
In this course, you’ll learn how to use single and multifactor authentication; explore single sign-on and device authentication; learn about one-way and two-way trust relationships and transitive trusts; participate in authorization, proofing, provisioning, maintenance, and entitlement; and differentiate between mandatory and discretionary access control, non-discretionary access control, and role-based and attribute-based access control. Please see http://blog.pluralsight.com/learning-path-systems-security-certified-practitioner-sscp-april-2015-objectives for other courses in this series.
Introduction
Introduction
Implement Authentication Mechanisms
Introduction
Single/Multifactor Authentication: Something You Know
Single/Multifactor Authentication: Something You Have
Single/Multifactor Authentication: Something You Are
Single/Multifactor Authentication: Examples
Single Sign-on
Single Sign-on: Kerberos
What This Module Covered
Operate Internetwork Trust Architectures
Introduction
One-way Trust Relationships
Two-way Trust Relationships
Transitive Trusts
What This Module Covered
Participate in the Identity-management Lifecycle
Introduction
Authorization and Proofing
Provisioning
Maintenance
Entitlement
What This Module Covered
Implement Access Controls
Introduction
Access Control Policies
Access Control Model: MAC
Discretionary Access Control: DAC
Non-Discretionary Access Control
Role Based Access Control: RBAC
Attribute Based Access Control: ABAC
What This Module Covered
Download File Size:265.12 MB