CRISC 2023: Authorization
Strong authorization settings limit permissions to resources for authenticated entities. Cybersecurity analysts must be aware of how to not only configure resource permissions but also how to evaluate existing permissions to ensure adherence to the principle of least privilege. In this course you will discover how authorization is related to but differs from authentication. Then you will explore access control models such as role-based access control (RBAC) and attribute-based access control (ABAC). Next you will find out how to manage Linux and Windows file system permissions using the command lines. Finally you will learn how to configure Windows dynamic access control work with privileged access management in Linux using sudo and manage RBAC permissions in the Microsoft Azure cloud. This course can be used to prepare for the ISACA Certified in Risk and Information Systems Control (CRISC) certification.