Access Control
Offered By: (ISC)² via Coursera
Course Description
Overview
Course 2 - Access Controls
This is the second course under the specialization SSCP.
In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models.
Course 2 Learning Objectives
After completing this course, the participant will be able to:
- Categorize identity and access management implementation authentication methods.
- Discuss the importance of trust from a security standpoint.
- Compare levels of trust among various relationships and internetwork architectures.
- Explain the implications of trust among third-party connections.
- Differentiate among the activities of the identity management life cycle.
- Categorize various access control models.
- Define the elements, methods, and processes used when administering access control models.
Who Should Take This Course: Beginners
Experience Required: No prior experience required
Syllabus
- Overview
- In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models.
Taught by
ISC2 Education & Training
Tags
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera