Acerca de este Curso

21,032 vistas recientes

Resultados profesionales del estudiante

17%

consiguió un beneficio tangible en su carrera profesional gracias a este curso
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 15 horas para completar
Inglés (English)
Subtítulos: Inglés (English)

Instructor

Resultados profesionales del estudiante

17%

consiguió un beneficio tangible en su carrera profesional gracias a este curso
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 15 horas para completar
Inglés (English)
Subtítulos: Inglés (English)

ofrecido por

Placeholder

(ISC)²

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up95%(1,454 calificaciones)Info
Semana
1

Semana 1

4 horas para completar

Implement Authentication Mechanisms

4 horas para completar
12 videos (Total 77 minutos), 11 lecturas, 1 cuestionario
12 videos
Authentication Mechanisms: Identity4m
Authentication Mechanisms: Methods7m
Authentication Mechanisms: Registration of New Users7m
Authentication Mechanisms: Clearance6m
Authentication Mechanisms: Proof of Identity6m
Authentication Mechanisms: Password Reset6m
Authentication Mechanisms: Mass Lockouts6m
Authentication Mechanisms: Biometrics9m
Authentication Mechanisms: Biometric Implementation Issues7m
Authentication Mechanisms: Biometric Accuracy6m
Authentication Mechanisms: Biometric Standards Development4m
11 lecturas
Authentication Mechanisms: Identity10m
Authentication Mechanisms: Methods10m
Authentication Mechanisms: Registration of New Users10m
Authentication Mechanisms: Clearance10m
Authentication Mechanisms: Proof of Identity10m
Authentication Mechanisms: Password Reset10m
Authentication Mechanisms: Mass Lockouts10m
Authentication Mechanisms: Biometrics10m
Authentication Mechanisms: Biometric Implementation Issues10m
Authentication Mechanisms: Biometric Accuracy10m
Authentication Mechanisms: Biometric Standards Development10m
1 ejercicio de práctica
Quiz 130m
Semana
2

Semana 2

3 horas para completar

Implement Authentication Mechanisms

3 horas para completar
11 videos (Total 66 minutos), 11 lecturas, 1 cuestionario
11 videos
Authentication Mechanisms: Types of Tokens6m
Authentication Mechanisms: Multifactor Authentication7m
Authentication Mechanisms: Multifactor Authentication5m
Authentication Mechanisms: Access to systems vs. data, Network5m
Authentication Mechanisms: Access Control Lists/Matrix7m
Authentication Mechanisms: Single Sign-On Risks4m
Authentication Mechanisms: Kerberos6m
Authentication Mechanisms: Kerberos Applications and Process5m
Authentication Mechanisms: Kerberos Considerations and Tools4m
Authentication Mechanisms: Types of Authentication5m
11 lecturas
Authentication Mechanisms: Uses of Token Information10m
Authentication Mechanisms: Types of Tokens10m
Authentication Mechanisms: Multifactor Authentication10m
Authentication Mechanisms: Multifactor Authentication10m
Authentication Mechanisms: Access to systems vs. data, Network10m
Authentication Mechanisms: Access Control Lists/ Matrix10m
Authentication Mechanisms: Single Sign-On Risks10m
Authentication Mechanisms: Kerberos10m
Authentication Mechanisms: Kerberos Applications and Process10m
Authentication Mechanisms: Kerberos Considerations and Tools10m
Authentication Mechanisms: Types of Authentication10m
1 ejercicio de práctica
Quiz 230m
Semana
3

Semana 3

2 horas para completar

Operate Internetwork Trust Architectures

2 horas para completar
4 videos (Total 26 minutos), 4 lecturas, 1 cuestionario
4 videos
Internetwork Trust Architecture: Trust Path7m
Internetwork Trust Architectures: Two-Way Trust2m
Internetwork Trust Architecture: Transitive Trust8m
4 lecturas
Internetwork Trust Architecture: Comparing Architectures10m
Internetwork Trust Architecture: Trust Path10m
Internetwork Trust Architecture: Two-Way Trust10m
Internetwork Trust Architecture: Transitive Trust10m
1 ejercicio de práctica
Quiz 330m
Semana
4

Semana 4

1 hora para completar

Administer Identity Management Life Cycle

1 hora para completar
3 videos (Total 15 minutos), 3 lecturas, 1 cuestionario
3 videos
Identity Management Life Cycle: Provisioning5m
Identity Management Life Cycle: Entitlement Defined4m
3 lecturas
Identity Management Life Cycle: Identity Management10m
Identity Management Life Cycle: Provisioning10m
Identity Management Life Cycle: Entitlement Defined10m
1 ejercicio de práctica
Quiz 430m

Reseñas

Principales reseñas sobre ACCESS CONTROLS

Ver todas las reseñas

Acerca de (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.