Leadership Development
Technology & Data Science
Computer Applications
Cybersecurity & CISSP
Data Management & Analytics
Emerging Technologies
Web Design
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community
Access Control and Identity Management Scenarios
Course Description
Introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. This course provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. Features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.
Learning Outcomes
After completing this course, the learner should be able to:
- Identify the four types of information access controls
- Describe different identification methods and technologies
- Discuss different components of Authentication, Authorization and Accounting
- Describe common access control models and mechanisms
- Explain the technologies used in single-sign-on systems
- Identify common access control attacks and countermeasures
- Provide appropriate guidance in response to real-world scenarios describing Access Control and Identity management challenges