New Training: Account Management Controls
![New Training: Identity Sources for vSphere picture: A New Training: Identity Sources for vSphere picture: A](http://images.ctfassets.net/aoyx73g9h2pg/7iUfICyRUlw73aa5mFY6Eq/f6d029ceba68b3eb41ecb3df02e59c52/Keith-Barker_3-1024x575.jpg?w=3840&q=100)
In this 10-video skill, CBT Nuggets trainer Keith Barker discusses and demonstrates identity and account management controls. Watch this new Cyber Security training.
Watch the full course: Implementing Secure Network, Cloud, and Mobile Solutions Training
This training includes:
10 videos
1.4 hours of training
You’ll learn these topics in this skill:
Intro to Account Mgmt. Controls
Shared Accounts
User Accounts
Guest Accounts
Service Accounts
Verifying Identity
SSH Authorized Keys
Password Policies
Conditional Access
Quiz and Review
3 Types Of Access Control
When studying for the CompTIA Security+ exam, you will need to understand the principles of identity and access management.
Identity and access management controls both who and what processes have access to resources. It also controls the type of access permitted as well (Eg. Read or read and write access to a network share). These control mechanisms can be implemented on computer systems, external devices, or both.
There are three different types of access control:
Mandatory access control
Discretionary access control
Role-based access control
Let's take a look at one of them: role-based access control.
Role-based access control is probably the most familiar type of access control in the IT environment. With this control mechanism, access is restricted based on the role an individual or service has. For instance, if an individual belongs to an administrator group in AD, they will most likely have access to all resources while an individual that belongs to an accounting group will only be able to access resources related to the accounting department.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.