Certificate in Cybersecurity Analysis (IIBA®- CCA): User Access Controls
Offered By: Pluralsight
Course Description
Overview
This course will teach you
how to define user
access controls necessary to address
cybersecurity needs required
to deliver
successful technology solutions.
Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.
how to define user
access controls necessary to address
cybersecurity needs required
to deliver
successful technology solutions.
Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.
Syllabus
- Course Overview 2mins
- Defining Access Controls and Authentication 15mins
- Defining Authorization and Access Requirements 13mins
Taught by
Jamie Champagne
Related Courses
Windows Server 2016: Securing Identities and InformationMicrosoft via edX Introduction to AWS for Non-Engineers: 2 Security
LinkedIn Learning How to Setup VLANs - Part 1
Tech Tutorials - David McKone via YouTube The Golden Ticket - Docker and High Security Microservices
Docker via YouTube Tales from the Risks Forum
Stanford University via YouTube