CISSP-Course

Home/Tag:CISSP-Course

Conduct Security Control Testing- Part 2

2020-07-15T12:45:53+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 2 This page is dedicated to continuing the Conduct Security Control Testing title. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. You can see the previous section here. Log Reviews Reviewing various security logs [...]

Conduct Security Control Testing- Part 1

2020-07-15T12:43:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 1 One of the most important topics in CISSP course is conduct security control testing. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. Security control testing employs various tools and techniques, including vulnerability assessments, [...]

Design & Validate Assessment Strategies

2020-07-15T12:49:59+00:00Tags: , , , , , , , , , , |

Design & Validate Assessment Strategies It is critical that organizations develop an effective strategy to regularly test, evaluate, and adapt their business and technology environment to reduce the probability and impact of successful attacks. In this part of this tutorial, we'll take a look at edesign & validate assessment strategies to help you understand [...]

Manage the Identity and Access Provisioning Lifecycle

2020-07-16T06:41:38+00:00Tags: , , , , , , , , , , , , |

Manage the Identity and Access Provisioning Lifecycle The life cycle consists of the assignment of privileges through roles and designation. The following design, a typical identity and provisioning life cycle consists of these steps: Enrolment of user or create user Determining roles, privileges, and access requirements to systems and applications Provisioning user accounts to [...]

Implement and Manage Authorization Mechanisms

2020-07-16T06:22:02+00:00Tags: , , , , |

Implement and Manage Authorization Mechanisms In this part of this tutorial, we'll take a look at implement and manage authorization mechanisms to help you understand the different aspects of authorization Mechanisms. Access control model is a framework that directs how subjects access objects. It uses access control technologies and security mechanisms to enforce the [...]

Integrate Identity-as-a-Service

2020-07-16T08:12:21+00:00Tags: , , , , , , , |

Integrate Identity-as-a-Service Where Microsoft servers are used, organizations can integrate their systems and applications with Microsoft Active Directory. In organizations without Microsoft servers, open source tools that use LDAP (lightweight directory access protocol) are a preferred choice. Identity as a third party and Identity as a Service are best example of identity management tools. [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Control Physical and Logical Access to Assets

2020-07-16T06:04:46+00:00Tags: , , , , , , , , , , , , , , , , , |

Control Physical and Logical Access to Assets Controlling access to assets is one of the central approaches to security. In this section; an asset includes information, systems, devices, and facilities. Systems An organization’s systems include any IT systems, which provide one or more services. Like a SQL Server, a FTP server, a Domain Controller, [...]

Secure Communication Channels

2020-07-16T07:09:00+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Communication Channels This section focuses on securing data in motion. Such as voice, e-mail, web, fax, remote access and virtualized networks. One of the important topics in CISSP course is secure communication channels. So, in this part of this tutorial, we'll take a look at secure communication to help you understand the different [...]

Go to Top