Securing User Accounts: Fundamental Security Concepts


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Online user accounts, when not properly secured, are one of easiest entry points for savvy hackers. In this course, you'll learn about the fundamental security concepts of authenticity, integrity, and confidentiality, and what role they play in establishing effective user account policies. You'll also learn why and how most common user account breaches happen. Finally, this course covers some general security practices, such as privilege management, permissions, and account settings, to help protect against potential intrusions via user accounts.

Target Audience
Individuals such as network administrators, programmers, risk managers, and other key individuals interested in establishing and maintaining secure user account policies and practices

Prerequisites
None

Expected Duration (hours)
2.6

Lesson Objectives

Securing User Accounts: Fundamental Security Concepts

  • start the course
  • identify the purpose and requirement for secure user account controls
  • describe characteristics of the fundamental security concept of authenticity as it relates to securing user accounts
  • describe characteristics of the fundamental security concept of integrity as it relates to securing user accounts
  • describe characteristics of the fundamental security concept of confidentiality as it relates to securing user accounts
  • describe goals and motives for user account security attacks
  • distinguish between the different phases of a security attack
  • identify characteristics of username enumeration
  • identify characteristics of Cross-Site Request Forgery or CSRF
  • distinguish between the different types of web server password cracking techniques
  • identify best practices for performing vulnerability scanning to prevent user account compromise
  • identify best practices for patching and updating to prevent user account compromise
  • identify best-practice network protocols to protect against general security attacks
  • identify best-practice account protocols to protect against user account security attacks
  • identify best practices for event logging as a method for identifying and preventing account security breaches
  • describe best practices for applying the security principle of least privilege in secure user account management
  • describe best practices for applying defense in depth strategy in secure user account management
  • distinguish between users, groups, and role structures for privileges
  • distinguish between the different access permissions categories available to assign to account users
  • identify characteristics and best practices of implementing appropriate naming convention restrictions for user accounts
  • identify characteristics and best practices for limiting logon attempts as a restriction for user accounts
  • identify best practices for setting account expiry dates
  • identify best practices for disabling unused user accounts
  • identify best practices for setting time restrictions on user accounts
  • identify best practices for setting machine restrictions on user accounts
  • identify appropriate user account security policies and practices
  • Course Number:
    sp_soaa_a01_it_enus

    Expertise Level
    Beginner