Details for this torrent 

Lynda Comptia Securityplus Exam Prep SY0 401 Access Control And
Type:
Other > Other
Files:
24
Size:
220.71 MiB (231426537 Bytes)
Uploaded:
2015-12-11 17:52:36 GMT
By:
BarCraft Trusted
Seeders:
0
Leechers:
3
Comments
0  

Info Hash:
C8764E771C364DCDD58ED0F3D45DFB506E1F2BA4




(Problems with magnets links are fixed by upgrading your torrent client!)
Get the training you need to pass the CompTIA Security
exam. This course covers the access control and identity
domain of the test. By learning about concepts such as
identification, authorization, authentication, and secure
account management practices, you'll be prepared to answer
some of the most challenging questions from the Security
exam
Author Mike Chapple, an IT leader with over 15 years
experience, introduces identification methods such as
usernames and biometrics, as well as authentication methods
to verify users, including multifactor authentication
password authentication, and single sign-on. He also
discusses authorization concepts such as mandatory and
discretionary access controls, which can help you restrict
access to sensitive parts of your network. The course also
covers best practices for ongoing account management, such
as establishing a good password policy, managing user
roles, and monitoring accounts, and what to do when you
need to suspend or terminate access
NOTE: Lynda.com is now a CompTIA Authorized Content
Provider. Our training prepares members to pass CompTIA
certification exams and become qualified IT professionals
Find more CompTIA tutorials here

Topics include:

* Setting policies for usernames and access cards

* Implementing biometrics

* Combining authentication factors for multifactor
authentication

* Using a Kerberos access control system

* Using access control lists such as Windows NTFS file
permissions

* Role-based authorization

* Implementing account and password policies

01. Introduction/01_01-Welcome.mp420.11 MiB
02. Identification/02_03-Biometrics.mp47.13 MiB
02. Identification/02_02-Usernames and access cards.mp46.52 MiB
02. Identification/02_01-Identification, authentication, and authorization.mp46.05 MiB
03. Authentication/03_03-Something you have.mp462.24 MiB
03. Authentication/03_01-Authentication factors.mp47.89 MiB
03. Authentication/03_07-Kerberos.mp46.99 MiB
03. Authentication/03_06-RADIUS and TACACS.mp46.94 MiB
03. Authentication/03_02-Multifactor authentication.mp45.45 MiB
03. Authentication/03_05-Single signon and federation.mp45.11 MiB
03. Authentication/03_04-Password authentication protocols.mp44.6 MiB
03. Authentication/03_08-SAML.mp43.94 MiB
04. Authorization/04_02-Mandatory access controls.mp49.81 MiB
04. Authorization/04_05-Advanced authorization concepts.mp48.76 MiB
04. Authorization/04_04-Access control lists.mp48.71 MiB
04. Authorization/04_01-Understanding authorization.mp47.36 MiB
04. Authorization/04_03-Discretionary access controls.mp43.89 MiB
05. Account Management/05_03-Password policy.mp48.25 MiB
05. Account Management/05_04-Managing roles.mp47.79 MiB
05. Account Management/05_06-Suspending and terminating access.mp46.88 MiB
05. Account Management/05_02-Account policies.mp46.59 MiB
05. Account Management/05_01-Understanding account and privilege management.mp44.29 MiB
05. Account Management/05_05-Account monitoring.mp43.8 MiB
06. Conclusion/06_01-Next steps.mp41.6 MiB