51ÁÔÆæ

Identity and Access Management

JUMP TO REGISTER

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts.

This course can be applied to the following certificate:
Cybersecurity Certificate

Benefits and Learning Outcomes

  • Understand the key principles and terminology of information access control
  • Discuss different types of identification and authorization techniques
  • Describe common access control models and mechanisms
  • Identify common access control attacks and countermeasures