Informações sobre o curso
4.5
30 classificações
6 avaliações

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 18 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 18 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
4 horas para concluir

Implement Authentication Mechanisms

Module Topics: Single Factor/Multifactor Authentication, Biometrics. In Single Factor/ Multifactor Authentication, you will learn about identity, methods, registration of new users, periodic review of access levels, clearance, authentication, knowledge, password reset, mass lockouts, ownership, and characteristics. In Biometrics, you will learn about biometrics, behavioral biometrics, physiological biometrics, biometric implementation issues, biometric accuracy, physiological use as identification, next-generation identification (NGI) database, department of defense (DoD) electronic biometric transmission specification (EBTS), and biometric standards development. ...
12 vídeos (total de (Total 77 mín.) min), 11 leituras, 1 teste
12 videos
Authentication Mechanisms: Identity4min
Authentication Mechanisms: Methods7min
Authentication Mechanisms: Registration of New Users7min
Authentication Mechanisms: Clearance6min
Authentication Mechanisms: Proof of Identity6min
Authentication Mechanisms: Password Reset6min
Authentication Mechanisms: Mass Lockouts6min
Authentication Mechanisms: Biometrics9min
Authentication Mechanisms: Biometric Implementation Issues7min
Authentication Mechanisms: Biometric Accuracy6min
Authentication Mechanisms: Biometric Standards Development4min
11 leituras
Authentication Mechanisms: Identity10min
Authentication Mechanisms: Methods10min
Authentication Mechanisms: Registration of New Users10min
Authentication Mechanisms: Clearance10min
Authentication Mechanisms: Proof of Identity10min
Authentication Mechanisms: Password Reset10min
Authentication Mechanisms: Mass Lockouts10min
Authentication Mechanisms: Biometrics10min
Authentication Mechanisms: Biometric Implementation Issues10min
Authentication Mechanisms: Biometric Accuracy10min
Authentication Mechanisms: Biometric Standards Development10min
1 exercício prático
Quiz 130min
Semana
2
3 horas para concluir

Implement Authentication Mechanisms

Module Topics: Tokens, Single Sign-On, Offline and Device Authentication. In Tokens, you will learn about uses of token information, time-synchronized one-time passwords, mathematical-algorithm based one time passwords, physical types, disconnected tokens, connected tokens, contactless tokens, bluetooth and mobile device tokens, smart cards, types of smart card technology, smart card applications, multifactor authentication, two-factor vs. three-factor authentication, dual control, continuous authentication, periodic authentication, time outs, reverse authentication, certificate-based authentication, authorization, access to systems vs. data, network, access control lists/matrix, and directories. In Single Sign-On, you will learn about SSO risks, SSO implementation: kerberos, Kerberos applications, Kerberos process, Kerberos considerations, Kerberos tools, Klist purge, Server 2012/(R2) and Windows 8/8.1 features, and network ports used during Kerberos authentication. In Offline and Device Authentication, you will learn about types of authentication. ...
11 vídeos (total de (Total 66 mín.) min), 11 leituras, 1 teste
11 videos
Authentication Mechanisms: Types of Tokens6min
Authentication Mechanisms: Multifactor Authentication7min
Authentication Mechanisms: Multifactor Authentication5min
Authentication Mechanisms: Access to systems vs. data, Network5min
Authentication Mechanisms: Access Control Lists/Matrix7min
Authentication Mechanisms: Single Sign-On Risks4min
Authentication Mechanisms: Kerberos6min
Authentication Mechanisms: Kerberos Applications and Process5min
Authentication Mechanisms: Kerberos Considerations and Tools4min
Authentication Mechanisms: Types of Authentication5min
11 leituras
Authentication Mechanisms: Uses of Token Information10min
Authentication Mechanisms: Types of Tokens10min
Authentication Mechanisms: Multifactor Authentication10min
Authentication Mechanisms: Multifactor Authentication10min
Authentication Mechanisms: Access to systems vs. data, Network10min
Authentication Mechanisms: Access Control Lists/ Matrix10min
Authentication Mechanisms: Single Sign-On Risks10min
Authentication Mechanisms: Kerberos10min
Authentication Mechanisms: Kerberos Applications and Process10min
Authentication Mechanisms: Kerberos Considerations and Tools10min
Authentication Mechanisms: Types of Authentication10min
1 exercício prático
Quiz 220min
Semana
3
1 hora para concluir

Operate Internetwork Trust Architectures

Module Topics: Comparing Internetwork Architectures, One-way Trust, Two-way Trust, and Transitive Trust. In Comparing Internetwork Architectures, you will learn about typical DMZ design, trust path. In Trust, you will learn about one-way trust, two-way trust, and transitive trust....
4 vídeos (total de (Total 26 mín.) min), 4 leituras, 1 teste
4 videos
Internetwork Trust Architecture: Trust Path7min
Internetwork Trust Architectures: Two-Way Trust2min
Internetwork Trust Architecture: Transitive Trust8min
4 leituras
Internetwork Trust Architecture: Comparing Architectures10min
Internetwork Trust Architecture: Trust Path10min
Internetwork Trust Architecture: Two-Way Trust10min
Internetwork Trust Architecture: Transitive Trust10min
1 exercício prático
Quiz 320min
Semana
4
1 hora para concluir

Administer Identity Management Life Cycle

Module Topics: Identity Management, Authorization, Proofing, Provisioning, Maintenance, and Entitlement. In Identity management, you will learn about identity management cycle. You will also learn about, authorization, proofing, provisioning, and maintenance. In Entitlement, you will learn about entities, entitlement defined. ...
3 vídeos (total de (Total 15 mín.) min), 3 leituras, 1 teste
3 videos
Identity Management Life Cycle: Provisioning5min
Identity Management Life Cycle: Entitlement Defined4min
3 leituras
Identity Management Life Cycle: Identity Management10min
Identity Management Life Cycle: Provisioning10min
Identity Management Life Cycle: Entitlement Defined10min
1 exercício prático
Quiz 420min
4.5
6 avaliaçõesChevron Right

25%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por POJan 21st 2019

If you wish to gain a very good overview of cyber security access controls, then I would highly recommend this course to you.

Instrutores

Avatar

(ISC)² Education & Training

Education & Training

Sobre (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Sobre o Programa de cursos integrados (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

  • Sim, você pode assistir uma prévia do primeiro vídeo e ver programa do curso antes de se inscrever. Você precisa comprar o curso para ter acesso ao conteúdo não incluído na prévia.

  • Se decidir se inscrever no curso antes da data de início da sessão, terá acesso a todos os vídeos das palestras e leituras do curso. Também poderá enviar tarefas assim que a sessão começar.

  • Uma vez inscrito, e tão logo sua sessão tenha iniciado, você terá acesso a todos os vídeos e outros recursos, incluindo itens de leitura e fórum de discussão do curso. Você poderá ver e enviar tarefas práticas e concluir tarefas com nota atribuída obrigatórias para obter uma nota e um Certificado de Curso.

  • Se você concluir o curso com êxito, seu Certificado de Curso eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn.

  • Este curso é um dos poucos oferecidos pela Coursera que está disponível apenas para alunos que tenham pago ou recebido auxílio financeiro, quando disponível.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.