Class Details

Price: $1,990

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations

Get Your Group Trained for Less with Our Federal Training Dollars Savings Plan

Course Outline

Part 1: The Need for Access Control Systems

Lesson 1:

Access Control Framework

Lesson 2:

Assessing Risk and Its Impact on Access Control

Lesson 3:

Business Drivers for Access Controls

Lesson 4:

Access Controls Law, Policies, and Standards

Lesson 5:

Security Breaches and the Law

Part 2: Mitigating Risk with Access Control Systems, Authentication, and PKI

Lesson 6:

Mapping Business Challenges to Access Control Types

Lesson 7:

Human Nature and Organizational Behavior

Lesson 8:

Access Control for Information Systems

Lesson 9:

Physical Security and Access Control

Lesson 10:

Access Control in the Enterprise

Part 3: Implementing, Testing, and Managing Access Control Systems

Lesson 11:

Access Control System Implementations

Lesson 12:

Access Control Solutions for Remote Workers

Lesson 13:

Public Key Infrastructure and Encryption

Lesson 14:

Testing Access Control Systems

Lesson 15:

Access Control Assurance


At the conclusion of this class, students will be able to do the following:

  • Define authorization and access to an IT infrastructure based on an access control policy framework.
  • Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • Analyze how a data classification standard impacts an IT infrastructure’s access control requirements and implementation.
  • Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  • Define proper security controls within the User Domain to mitigate risks and threats caused by human behavior.
  • Implement appropriate access controls for information systems within IT infrastructures.
  • Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.
  • Implement a secure remote access solution.
  • Implement PKI and encryption solutions to ensure the confidentiality of business communications.
  • Mitigate risk from unauthorized access to IT systems through proper testing and reporting.