Über diesen Kurs
12,466 recent views

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 17 Stunden zum Abschließen

Empfohlen: 4 hours/week...

Englisch

Untertitel: Englisch

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 17 Stunden zum Abschließen

Empfohlen: 4 hours/week...

Englisch

Untertitel: Englisch

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
4 Stunden zum Abschließen

Implement Authentication Mechanisms

Module Topics: Single Factor/Multifactor Authentication, Biometrics. In Single Factor/ Multifactor Authentication, you will learn about identity, methods, registration of new users, periodic review of access levels, clearance, authentication, knowledge, password reset, mass lockouts, ownership, and characteristics. In Biometrics, you will learn about biometrics, behavioral biometrics, physiological biometrics, biometric implementation issues, biometric accuracy, physiological use as identification, next-generation identification (NGI) database, department of defense (DoD) electronic biometric transmission specification (EBTS), and biometric standards development. ...
12 Videos (Gesamt 77 min), 11 Lektüren, 1 Quiz
12 Videos
Authentication Mechanisms: Identity4m
Authentication Mechanisms: Methods7m
Authentication Mechanisms: Registration of New Users7m
Authentication Mechanisms: Clearance6m
Authentication Mechanisms: Proof of Identity6m
Authentication Mechanisms: Password Reset6m
Authentication Mechanisms: Mass Lockouts6m
Authentication Mechanisms: Biometrics9m
Authentication Mechanisms: Biometric Implementation Issues7m
Authentication Mechanisms: Biometric Accuracy6m
Authentication Mechanisms: Biometric Standards Development4m
11 Lektüren
Authentication Mechanisms: Identity10m
Authentication Mechanisms: Methods10m
Authentication Mechanisms: Registration of New Users10m
Authentication Mechanisms: Clearance10m
Authentication Mechanisms: Proof of Identity10m
Authentication Mechanisms: Password Reset10m
Authentication Mechanisms: Mass Lockouts10m
Authentication Mechanisms: Biometrics10m
Authentication Mechanisms: Biometric Implementation Issues10m
Authentication Mechanisms: Biometric Accuracy10m
Authentication Mechanisms: Biometric Standards Development10m
1 praktische Übung
Quiz 130m
Woche
2
3 Stunden zum Abschließen

Implement Authentication Mechanisms

Module Topics: Tokens, Single Sign-On, Offline and Device Authentication. In Tokens, you will learn about uses of token information, time-synchronized one-time passwords, mathematical-algorithm based one time passwords, physical types, disconnected tokens, connected tokens, contactless tokens, bluetooth and mobile device tokens, smart cards, types of smart card technology, smart card applications, multifactor authentication, two-factor vs. three-factor authentication, dual control, continuous authentication, periodic authentication, time outs, reverse authentication, certificate-based authentication, authorization, access to systems vs. data, network, access control lists/matrix, and directories. In Single Sign-On, you will learn about SSO risks, SSO implementation: kerberos, Kerberos applications, Kerberos process, Kerberos considerations, Kerberos tools, Klist purge, Server 2012/(R2) and Windows 8/8.1 features, and network ports used during Kerberos authentication. In Offline and Device Authentication, you will learn about types of authentication. ...
11 Videos (Gesamt 66 min), 11 Lektüren, 1 Quiz
11 Videos
Authentication Mechanisms: Types of Tokens6m
Authentication Mechanisms: Multifactor Authentication7m
Authentication Mechanisms: Multifactor Authentication5m
Authentication Mechanisms: Access to systems vs. data, Network5m
Authentication Mechanisms: Access Control Lists/Matrix7m
Authentication Mechanisms: Single Sign-On Risks4m
Authentication Mechanisms: Kerberos6m
Authentication Mechanisms: Kerberos Applications and Process5m
Authentication Mechanisms: Kerberos Considerations and Tools4m
Authentication Mechanisms: Types of Authentication5m
11 Lektüren
Authentication Mechanisms: Uses of Token Information10m
Authentication Mechanisms: Types of Tokens10m
Authentication Mechanisms: Multifactor Authentication10m
Authentication Mechanisms: Multifactor Authentication10m
Authentication Mechanisms: Access to systems vs. data, Network10m
Authentication Mechanisms: Access Control Lists/ Matrix10m
Authentication Mechanisms: Single Sign-On Risks10m
Authentication Mechanisms: Kerberos10m
Authentication Mechanisms: Kerberos Applications and Process10m
Authentication Mechanisms: Kerberos Considerations and Tools10m
Authentication Mechanisms: Types of Authentication10m
1 praktische Übung
Quiz 220m
Woche
3
1 Stunde zum Abschließen

Operate Internetwork Trust Architectures

Module Topics: Comparing Internetwork Architectures, One-way Trust, Two-way Trust, and Transitive Trust. In Comparing Internetwork Architectures, you will learn about typical DMZ design, trust path. In Trust, you will learn about one-way trust, two-way trust, and transitive trust....
4 Videos (Gesamt 26 min), 4 Lektüren, 1 Quiz
4 Videos
Internetwork Trust Architecture: Trust Path7m
Internetwork Trust Architectures: Two-Way Trust2m
Internetwork Trust Architecture: Transitive Trust8m
4 Lektüren
Internetwork Trust Architecture: Comparing Architectures10m
Internetwork Trust Architecture: Trust Path10m
Internetwork Trust Architecture: Two-Way Trust10m
Internetwork Trust Architecture: Transitive Trust10m
1 praktische Übung
Quiz 320m
Woche
4
1 Stunde zum Abschließen

Administer Identity Management Life Cycle

Module Topics: Identity Management, Authorization, Proofing, Provisioning, Maintenance, and Entitlement. In Identity management, you will learn about identity management cycle. You will also learn about, authorization, proofing, provisioning, and maintenance. In Entitlement, you will learn about entities, entitlement defined. ...
3 Videos (Gesamt 15 min), 3 Lektüren, 1 Quiz
3 Videos
Identity Management Life Cycle: Provisioning5m
Identity Management Life Cycle: Entitlement Defined4m
3 Lektüren
Identity Management Life Cycle: Identity Management10m
Identity Management Life Cycle: Provisioning10m
Identity Management Life Cycle: Entitlement Defined10m
1 praktische Übung
Quiz 420m
4.5
7 BewertungenChevron Right

25%

ziehen Sie für Ihren Beruf greifbaren Nutzen aus diesem Kurs

Top-Bewertungen

von POJan 21st 2019

If you wish to gain a very good overview of cyber security access controls, then I would highly recommend this course to you.

Dozent

Avatar

(ISC)² Education & Training

Education & Training

Über (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Über die Spezialisierung (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Häufig gestellte Fragen

  • Ja, Sie können eine Vorschau des ersten Videos und den Lehrplan ansehen, bevor Sie sich anmelden. Sie müssen den Kurs kaufen, um Zugriff auf die Inhalte zu erhalten, die nicht in der Vorschau inbegriffen sind.

  • Wenn Sie sich vor dem Startdatum der ersten Kurseinheit anmelden, haben Sie Zugriff auf alle Vortragsvideos und Texte für den Kurs. Sobald die erste Kurseinheit beginnt, können Sie Aufgaben einreichen.

  • Sobald Sie sich anmelden und Ihre Kurseinheit beginnt, haben Sie Zugriff auf alle Videos und andere Ressourcen, einschließlich der Texte und des Kurs-Diskussionsforums. Sie können praktische Aufgaben ansehen und einreichen und erforderliche bewertete Aufgaben abschließen, um eine Bewertung und ein Kurszertifikat zu erhalten.

  • Wenn Sie den Kurs erfolgreich abschließen, wird der Seite „Errungenschaften“ Ihr elektronisches Kurszertifikat hinzugefügt – von dort können Sie Ihr Kurszertifikat ausdrucken oder es zu Ihrem LinkedIn-Profil hinzufügen.

  • Dieser Kurs ist einer der wenigen auf Coursera angebotenen Kurse, die derzeit ausschließlich für Kursteilnehmer zugänglich sind, die bezahlt oder finanzielle Unterstützung erhalten haben, wenn diese verfügbar ist.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..