Course Description
Covers logical and physical access control policy and mechanisms for cyber systems. Also covers the role of authorization, identification, authentication, and monitoring in access control.
Prerequisite: CSEC 2310 - System Security
Credit Hours: 3
Objectives:
- Define access control and identity management concepts.
- Analyze how an information classification standard impacts an IT infrastructure’s access control requirements and implementation.
- Define proper security controls and techniques to mitigate risks and threats in an IT infrastructure.
- Design appropriate authentication solutions throughout an IT infrastructure.
- Implement appropriate access controls and identity management techniques within IT infrastructures.
- Implement a secure remote access solution.
- Implement PKI and encryption solutions to ensure the confidentiality of business communications.
- Mitigate risk from unauthorized access to IT systems through proper testing and monitoring.
- Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
- Assess the consequences of failed access controls and mitigate unauthorized access.
Why take this course?
In today's world, controlling access to sensitive information is crucial. This Access Control course equips you with the skills to design, implement, and manage robust access control systems, protecting valuable data from unauthorized access. You will learn to:
- Implement and manage access controls: Gain hands-on experience with various access control techniques and identity management best practices across diverse IT infrastructures.
- Develop a comprehensive access control policy framework: Craft policies, standards, procedures, and guidelines based on industry best practices to ensure secure access and compliance.
- Utilize PKI and encryption: Implement Public Key Infrastructure (PKI) and encryption to secure communications and protect data confidentiality.
This course is ideal for students pursuing cybersecurity, IT management, or system administration roles. Become a guardian of digital assets and build a career securing the future of information.