Coursera
Coursera Logo

Access Controls 

  • Offered byCoursera
  • Public/Government Institute

Access Controls
 at 
Coursera 
Overview

Duration

15 hours

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Access Controls
Table of content
Accordion Icon V3

Access Controls
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 1 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Beginner Level
  • Approx. 15 hours to complete
  • English Subtitles: English
Read more
Details Icon

Access Controls
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Welcome to Access Controls!
  • The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
  • The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
  • Objectives
  • 1. Describe how to implement Authentication mechanisms
  • 2. Identify and operate internetwork trust architectures
  • 3. Describe the process of administering identity management life cycle
  • 4. Implement the different types of access controls (Subject/Object based)
Read more

Access Controls
 at 
Coursera 
Curriculum

Implement Authentication Mechanisms

Welcome to Access Controls

Authentication Mechanisms: Identity

Authentication Mechanisms: Methods

Authentication Mechanisms: Registration of New Users

Authentication Mechanisms: Clearance

Authentication Mechanisms: Proof of Identity

Authentication Mechanisms: Password Reset

Authentication Mechanisms: Mass Lockouts

Authentication Mechanisms: Biometrics

Authentication Mechanisms: Biometric Implementation Issues

Authentication Mechanisms: Biometric Accuracy

Authentication Mechanisms: Biometric Standards Development

Authentication Mechanisms: Identity

Authentication Mechanisms: Methods

Authentication Mechanisms: Registration of New Users

Authentication Mechanisms: Clearance

Authentication Mechanisms: Proof of Identity

Authentication Mechanisms: Password Reset

Authentication Mechanisms: Mass Lockouts

Authentication Mechanisms: Biometrics

Authentication Mechanisms: Biometric Implementation Issues

Authentication Mechanisms: Biometric Accuracy

Authentication Mechanisms: Biometric Standards Development

Quiz 1

Implement Authentication Mechanisms

Authentication Mechanisms: Uses of Token Information

Authentication Mechanisms: Types of Tokens

Authentication Mechanisms: Multifactor Authentication

Authentication Mechanisms: Multifactor Authentication

Authentication Mechanisms: Access to systems vs. data, Network

Authentication Mechanisms: Access Control Lists/Matrix

Authentication Mechanisms: Single Sign-On Risks

Authentication Mechanisms: Kerberos

Authentication Mechanisms: Kerberos Applications and Process

Authentication Mechanisms: Kerberos Considerations and Tools

Authentication Mechanisms: Types of Authentication

Authentication Mechanisms: Uses of Token Information

Authentication Mechanisms: Types of Tokens

Authentication Mechanisms: Multifactor Authentication

Authentication Mechanisms: Multifactor Authentication

Authentication Mechanisms: Access to systems vs. data, Network

Authentication Mechanisms: Access Control Lists/ Matrix

Authentication Mechanisms: Single Sign-On Risks

Authentication Mechanisms: Kerberos

Authentication Mechanisms: Kerberos Applications and Process

Authentication Mechanisms: Kerberos Considerations and Tools

Authentication Mechanisms: Types of Authentication

Quiz 2

Operate Internetwork Trust Architectures

Internetwork Trust Architecture: Comparing Architectures

Internetwork Trust Architecture: Trust Path

Internetwork Trust Architectures: Two-Way Trust

Internetwork Trust Architecture: Transitive Trust

Internetwork Trust Architecture: Comparing Architectures

Internetwork Trust Architecture: Trust Path

Internetwork Trust Architecture: Two-Way Trust

Internetwork Trust Architecture: Transitive Trust

Quiz 3

Administer Identity Management Life Cycle

Identity Management Life Cycle: Identity Management

Identity Management Life Cycle: Provisioning

Identity Management Life Cycle: Entitlement Defined

Identity Management Life Cycle: Identity Management

Identity Management Life Cycle: Provisioning

Identity Management Life Cycle: Entitlement Defined

Quiz 4

Implement Access Controls

Implement Access Controls: Mandatory Access Control

Implement Access Controls: Discretionary and Non-Discretionary Access Controls

Implement Access Controls: Rule-Set Based and Role-Based Access Control

Implement Access Controls: Role Hierarchies

Implement Access Controls: Restricted Interfaces

Implement Access Controls: key Terms

Implement Access Controls: Security Architecture and Models

Implement Access Controls: BLP and Biba Model Comparison

Implement Access Controls: BLP and Biba Model Comparison

Implement Access Controls: Mandatory Access Control

Implement Access Controls: Discretionary and Non-Discretionary Access Controls

Implement Access Controls: Rule-Set Based and Role-Based Access Control

Implement Access Controls: Role Hierarchies

Implement Access Controls: Restricted Interfaces

Implement Access Controls: Key Terms

Implement Access Controls: Security Architecture and Models

Implement Access Controls: BLP and Biba Model Comparison

Implement Access Controls: BLP and Biba Model Comparison

Quiz 5

Case Study

Exam

SSCP Exam Information

Access Controls Course Assessment

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6716 CoursesRight Arrow Icon
qna

Access Controls
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...