Certificate in Cybersecurity Analysis (IIBA®- CCA): User Access Controls
Offered By: Pluralsight
Course Description
Overview
This course will teach you
how to define user
access controls necessary to address
cybersecurity needs required
to deliver
successful technology solutions.
Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.
how to define user
access controls necessary to address
cybersecurity needs required
to deliver
successful technology solutions.
Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.
Syllabus
- Course Overview 2mins
- Defining Access Controls and Authentication 15mins
- Defining Authorization and Access Requirements 13mins
Taught by
Jamie Champagne
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network