Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Access Control

(ISC)² via Coursera

Overview

Course 2 - Access Controls This is the second course under the specialization SSCP. In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models. Course 2 Learning Objectives After completing this course, the participant will be able to:  - Categorize identity and access management implementation authentication methods.  - Discuss the importance of trust from a security standpoint.  - Compare levels of trust among various relationships and internetwork architectures.  - Explain the implications of trust among third-party connections.  - Differentiate among the activities of the identity management life cycle.  - Categorize various access control models.  - Define the elements, methods, and processes used when administering access control models.  Who Should Take This Course: Beginners Experience Required: No prior experience required

Syllabus

  • Overview
    • In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models.

Taught by

ISC2 Education & Training

Reviews

Start your review of Access Control

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.