Course details

System Security Certified Practitioner (SSCP 2018): Controlling Resource Access

System Security Certified Practitioner (SSCP 2018): Controlling Resource Access


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 14-video course explores common methods and uses real-world examples for providing resource access after authentication. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining defense in depth, a security term for multiple layers of security. You will learn about Discretionary Access Control, where the resource owner sets the permissions. You will learn how to use the Windows command line to manage a Windows file system access control list, and you will examine MAC (mandatory access control). You will learn to modify the default file system access control permissions on a Linux host using umask. You will examine RBAC (role-based access control). You will learn to use Microsoft PowerShell to assign permissions to a Windows group. You will learn to assign permissions to a group in Linux, and how to modify the default file system access control permissions on a Linux host by using umask. You will learn to configure Attribute-based Access Control in Windows, and object-level access control. Finally, learners will examine NAC (network access control).



Expected Duration (hours)
1.0

Lesson Objectives

System Security Certified Practitioner (SSCP 2018): Controlling Resource Access

  • Course Overview
  • describe how authorization follows authentication to allow resource access
  • compare and contrast DAC with MAC
  • use the icacls command to configure DAC
  • compare and contrast DAC with MAC
  • set the Linux umask to control default permissions
  • list the benefits of using RBAC
  • use the PowerShell Set-Acl cmdlet to configure RBAC
  • use Linux to configure RBAC
  • compare attribute-based AC to DAC and MAC
  • use Windows to configure ABAC
  • discuss alternate access control methods
  • specify when 802.1x remediation, quarantine, and admission should be configured for thin clients, VPNs, and teleworkers
  • apply access control techniques to secure assets
  • Course Number:
    it_spsscpdj_07_enus

    Expertise Level
    Intermediate