Module 1: Document, Implement, and Maintain Functional Security Controls-Module 1: Document, Implement, and Maintain Functional Security Controls
Welcome
Welcome Video
()
Module 1 Overview
Applied Scenario 1: Governance and Policies
()
Security Strategy
()
Administrative Controls
()
Technical Controls
()
Implementation and Assessment
()
Module 2: Access Controls Models-Module 2: Access Controls Models
Access Control Fundamental Concepts
Applied Scenario 2: Access Controls
()
Trusted Computing Base (TCB)
()
The Data Security Lifecycle
System Models: Biba and Bell-LaPadula
Mandatory Access Control (MAC)
()
Module 3: Identity Management Lifecycle-Module 3: Identity Management Lifecycle
Identity Management Lifecycle
()
Authentication
()
Tokens
()
Types of Tokens
Biometrics
()
Biometric Data Security Standards
Biometric Standards Development
()
Authorization
()
Entitlement
()
Module 4: Implement and Maintain Authentication Methods-Module 4: Implement and Maintain Authentication Methods
Module 4 Overview
Decentralized Access Control Management
Single Sign-on (SSO)
()
Federated Access
()
Security Assertion Markup Language (SAML)
()
Open Authorization (OAuth)
()
Third-Party Connections
Identity as a Service (IDaaS)
Kerberos
()
Trust
()
Manage Network Access Controls
()
Session Management
()
Module 5: Chapter 2 Review-Module 5: Chapter 2 Review
Terms and Definitions