Class Details

Course Outline

Part 1: The Need for Access Control Systems Chapter 1: Access Control Framework Chapter 2:Assessing Risk and Its Impact on Access Control Chapter 3:Business Drivers for Access Controls Chapter 4:Access Controls Law, Policies, and Standards Chapter 5:Security Breaches and the Law


Part 2: Mitigating Risk with Access Control Systems, Authentication, and PKI Chapter 6:Mapping Business Challenges to Access Control TypesChapter 7:Human Nature and Organizational Behavior Chapter 8:Access Control for Information Systems Chapter 9:Physical Security and Access Control Chapter 10:Access Control in the Enterprise




Part 3: Implementing, Testing, and Managing Access Control Systems Chapter 11:Access Control System Implementations Chapter 12:Access Control Solutions for Remote Workers Chapter 13:Public Key Infrastructure and Encryption Chapter 14:Testing Access Control Systems Chapter 15:Access Control Assurance