

Access Controls
- Offered byCoursera
- Public/Government Institute
Access Controls at Coursera Overview
Duration | 15 hours |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Access Controls at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 1 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 15 hours to complete
- English Subtitles: English
Access Controls at Coursera Course details
- Welcome to Access Controls!
- The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
- The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
- Objectives
- 1. Describe how to implement Authentication mechanisms
- 2. Identify and operate internetwork trust architectures
- 3. Describe the process of administering identity management life cycle
- 4. Implement the different types of access controls (Subject/Object based)
Access Controls at Coursera Curriculum
Implement Authentication Mechanisms
Welcome to Access Controls
Authentication Mechanisms: Identity
Authentication Mechanisms: Methods
Authentication Mechanisms: Registration of New Users
Authentication Mechanisms: Clearance
Authentication Mechanisms: Proof of Identity
Authentication Mechanisms: Password Reset
Authentication Mechanisms: Mass Lockouts
Authentication Mechanisms: Biometrics
Authentication Mechanisms: Biometric Implementation Issues
Authentication Mechanisms: Biometric Accuracy
Authentication Mechanisms: Biometric Standards Development
Authentication Mechanisms: Identity
Authentication Mechanisms: Methods
Authentication Mechanisms: Registration of New Users
Authentication Mechanisms: Clearance
Authentication Mechanisms: Proof of Identity
Authentication Mechanisms: Password Reset
Authentication Mechanisms: Mass Lockouts
Authentication Mechanisms: Biometrics
Authentication Mechanisms: Biometric Implementation Issues
Authentication Mechanisms: Biometric Accuracy
Authentication Mechanisms: Biometric Standards Development
Quiz 1
Implement Authentication Mechanisms
Authentication Mechanisms: Uses of Token Information
Authentication Mechanisms: Types of Tokens
Authentication Mechanisms: Multifactor Authentication
Authentication Mechanisms: Multifactor Authentication
Authentication Mechanisms: Access to systems vs. data, Network
Authentication Mechanisms: Access Control Lists/Matrix
Authentication Mechanisms: Single Sign-On Risks
Authentication Mechanisms: Kerberos
Authentication Mechanisms: Kerberos Applications and Process
Authentication Mechanisms: Kerberos Considerations and Tools
Authentication Mechanisms: Types of Authentication
Authentication Mechanisms: Uses of Token Information
Authentication Mechanisms: Types of Tokens
Authentication Mechanisms: Multifactor Authentication
Authentication Mechanisms: Multifactor Authentication
Authentication Mechanisms: Access to systems vs. data, Network
Authentication Mechanisms: Access Control Lists/ Matrix
Authentication Mechanisms: Single Sign-On Risks
Authentication Mechanisms: Kerberos
Authentication Mechanisms: Kerberos Applications and Process
Authentication Mechanisms: Kerberos Considerations and Tools
Authentication Mechanisms: Types of Authentication
Quiz 2
Operate Internetwork Trust Architectures
Internetwork Trust Architecture: Comparing Architectures
Internetwork Trust Architecture: Trust Path
Internetwork Trust Architectures: Two-Way Trust
Internetwork Trust Architecture: Transitive Trust
Internetwork Trust Architecture: Comparing Architectures
Internetwork Trust Architecture: Trust Path
Internetwork Trust Architecture: Two-Way Trust
Internetwork Trust Architecture: Transitive Trust
Quiz 3
Administer Identity Management Life Cycle
Identity Management Life Cycle: Identity Management
Identity Management Life Cycle: Provisioning
Identity Management Life Cycle: Entitlement Defined
Identity Management Life Cycle: Identity Management
Identity Management Life Cycle: Provisioning
Identity Management Life Cycle: Entitlement Defined
Quiz 4
Implement Access Controls
Implement Access Controls: Mandatory Access Control
Implement Access Controls: Discretionary and Non-Discretionary Access Controls
Implement Access Controls: Rule-Set Based and Role-Based Access Control
Implement Access Controls: Role Hierarchies
Implement Access Controls: Restricted Interfaces
Implement Access Controls: key Terms
Implement Access Controls: Security Architecture and Models
Implement Access Controls: BLP and Biba Model Comparison
Implement Access Controls: BLP and Biba Model Comparison
Implement Access Controls: Mandatory Access Control
Implement Access Controls: Discretionary and Non-Discretionary Access Controls
Implement Access Controls: Rule-Set Based and Role-Based Access Control
Implement Access Controls: Role Hierarchies
Implement Access Controls: Restricted Interfaces
Implement Access Controls: Key Terms
Implement Access Controls: Security Architecture and Models
Implement Access Controls: BLP and Biba Model Comparison
Implement Access Controls: BLP and Biba Model Comparison
Quiz 5
Case Study
Exam
SSCP Exam Information
Access Controls Course Assessment
Other courses offered by Coursera
Student Forum
Useful Links
Know more about Coursera
Know more about Programs
- Engineering
- Food Technology
- Instrumentation Technology
- BTech Chemical Engineering
- AI & ML Courses
- Aeronautical Engineering
- BTech Petroleum Engineering
- Petroleum Engineering
- VLSI Design
- MTech in Computer Science Engineering
- Metallurgical Engineering
- BTech Robotics Engineering
- BTech in Biotechnology Engineering
- Aerospace Engineering
- BTech Mechatronics Engineering