Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
4. System Security/Access Control
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Implement authorization control (e.g., least privilege, separation of duties, mandatory access, rule-based access control, role-based access control). | skill | 2 | |
b | Perform authentication control. | skill | 3 | |
c | Understand authentication techniques (e.g., Tokens, Common access card, Smart card, Multifactor authentication, Single sign-on, Biometrics, Personal identification verification card, Username, Federation, Transitive trust/authentication). | knowledge | 2 | |
d | Understand security implications of third party connectivity and access. | knowledge | 2 | |
e | Understand security implications of third party connectivity and access. | knowledge | 2 | |
f | Understand cybersecurity of physical security and perimeter security (Proximity readers, Access list, Biometrics, Protected distribution (cabling). | knowledge | 2 | |
g | Inventory devices and applications. | knowledge | 4 | |
h | Understand and manage Privileged Access Management. | skill | 4 |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP