Access Control and Identity Management Scenarios


          Start Today!

          Add to cart

          Professional Credits:

          CEU: 0.5
          ATD CI: 5
          HRCI: 5
          PDU: 5
          SHRM: 5


          Start Today!

          Add to cart

          Completion Time

          5 hours

          Access Time

          90 Days


          Individual Skill Course



          Training Level


          Delivery Information:

          Online Asynchronous Self-paced


          Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This training course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

          Learning Outcomes

          After completing this course, the learner should be able to:
          • Identify the four types of information access controls
          • Describe different identification methods and technologies
          • Discuss different components of Authentication, Authorization and Accounting
          • Describe common access control models and mechanisms
          • Explain the technologies used in single-sign-on systems
          • Identify common access control attacks and countermeasures
          • Provide appropriate guidance in response to real-world scenarios describing Access Control and Identity management challenges


          Start Today!
          Add to cart