Identity and Access Management
Access Time: 30 Days
This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other.
The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.
After completing this course, you'll be able to:
- Understand the key principles and terminology of information access control
- Discuss different types of identification and authorization techniques
- Describe common access control models and mechanisms
- Identify common access control attacks and countermeasures
Preview a few course pages by clicking through the slideshow below:
Target Audience: This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.
Level/Prerequisites: Intermediate/Requires some basic understanding of IT concepts
Estimated time to complete: 3-5 hours
Ask the Expert: This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.
Required Material: This course does not require any additional purchases of supplementary materials.
Successful Completion Requirement for IACET CEU: Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEU credit. Learners will have three attempts at all graded assessments.