- Level Foundation
- المدة 15 ساعات hours
- الطبع بواسطة ISC2
-
Offered by
عن
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Objectives 1. Describe how to implement Authentication mechanisms 2. Identify and operate internetwork trust architectures 3. Describe the process of administering identity management life cycle 4. Implement the different types of access controls (Subject/Object based)الوحدات
Welcome to Access Control
1
Discussions
- Discussion: Access Controls
1
Videos
- Welcome to Access Controls
Implement Authentication Mechanisms
1
Assignment
- Quiz 1
11
Videos
- Authentication Mechanisms: Identity
- Authentication Mechanisms: Methods
- Authentication Mechanisms: Registration of New Users
- Authentication Mechanisms: Clearance
- Authentication Mechanisms: Proof of Identity
- Authentication Mechanisms: Password Reset
- Authentication Mechanisms: Mass Lockouts
- Authentication Mechanisms: Biometrics
- Authentication Mechanisms: Biometric Implementation Issues
- Authentication Mechanisms: Biometric Accuracy
- Authentication Mechanisms: Biometric Standards Development
11
Readings
- Authentication Mechanisms: Identity
- Authentication Mechanisms: Methods
- Authentication Mechanisms: Registration of New Users
- Authentication Mechanisms: Clearance
- Authentication Mechanisms: Proof of Identity
- Authentication Mechanisms: Password Reset
- Authentication Mechanisms: Mass Lockouts
- Authentication Mechanisms: Biometrics
- Authentication Mechanisms: Biometric Implementation Issues
- Authentication Mechanisms: Biometric Accuracy
- Authentication Mechanisms: Biometric Standards Development
Implement Authentication Mechanisms
1
Assignment
- Quiz 2
11
Videos
- Authentication Mechanisms: Uses of Token Information
- Authentication Mechanisms: Types of Tokens
- Authentication Mechanisms: Multifactor Authentication
- Authentication Mechanisms: Multifactor Authentication
- Authentication Mechanisms: Access to systems vs. data, Network
- Authentication Mechanisms: Access Control Lists/Matrix
- Authentication Mechanisms: Single Sign-On Risks
- Authentication Mechanisms: Kerberos
- Authentication Mechanisms: Kerberos Applications and Process
- Authentication Mechanisms: Kerberos Considerations and Tools
- Authentication Mechanisms: Types of Authentication
11
Readings
- Authentication Mechanisms: Uses of Token Information
- Authentication Mechanisms: Types of Tokens
- Authentication Mechanisms: Multifactor Authentication
- Authentication Mechanisms: Multifactor Authentication
- Authentication Mechanisms: Access to systems vs. data, Network
- Authentication Mechanisms: Access Control Lists/ Matrix
- Authentication Mechanisms: Single Sign-On Risks
- Authentication Mechanisms: Kerberos
- Authentication Mechanisms: Kerberos Applications and Process
- Authentication Mechanisms: Kerberos Considerations and Tools
- Authentication Mechanisms: Types of Authentication
Operate Internetwork Trust Architectures
1
Assignment
- Quiz 3
4
Videos
- Internetwork Trust Architecture: Comparing Architectures
- Internetwork Trust Architecture: Trust Path
- Internetwork Trust Architectures: Two-Way Trust
- Internetwork Trust Architecture: Transitive Trust
4
Readings
- Internetwork Trust Architecture: Comparing Architectures
- Internetwork Trust Architecture: Trust Path
- Internetwork Trust Architecture: Two-Way Trust
- Internetwork Trust Architecture: Transitive Trust
Administer Identity Management Life Cycle
1
Assignment
- Quiz 4
3
Videos
- Identity Management Life Cycle: Identity Management
- Identity Management Life Cycle: Provisioning
- Identity Management Life Cycle: Entitlement Defined
3
Readings
- Identity Management Life Cycle: Identity Management
- Identity Management Life Cycle: Provisioning
- Identity Management Life Cycle: Entitlement Defined
Implement Access Controls
1
Assignment
- Quiz 5
9
Videos
- Implement Access Controls: Mandatory Access Control
- Implement Access Controls: Discretionary and Non-Discretionary Access Controls
- Implement Access Controls: Rule-Set Based and Role-Based Access Control
- Implement Access Controls: Role Hierarchies
- Implement Access Controls: Restricted Interfaces
- Implement Access Controls: key Terms
- Implement Access Controls: Security Architecture and Models
- Implement Access Controls: BLP and Biba Model Comparison
- Implement Access Controls: BLP and Biba Model Comparison
9
Readings
- Implement Access Controls: Mandatory Access Control
- Implement Access Controls: Discretionary and Non-Discretionary Access Controls
- Implement Access Controls: Rule-Set Based and Role-Based Access Control
- Implement Access Controls: Role Hierarchies
- Implement Access Controls: Restricted Interfaces
- Implement Access Controls: Key Terms
- Implement Access Controls: Security Architecture and Models
- Implement Access Controls: BLP and Biba Model Comparison
- Implement Access Controls: BLP and Biba Model Comparison
Access Control Case Study
1
Peer Review
- Peer Review: Access Controls Case Study
Exam Information
1
Readings
- SSCP Exam Information
End of Course Assessment
1
Assignment
- Access Controls Course Assessment
Auto Summary
The Access Controls course, offered by Coursera, is a foundational IT & Computer Science program focused on user permissions, resource access, and system operations. Led by expert instructors, it covers authentication mechanisms, internetwork trust architectures, identity management, and various access control types. With a 900-minute duration, learners can choose from Starter or Professional subscription options. Ideal for managers and IT professionals aiming to enhance system security through effective access control implementation.

ISC2 Education & Training