Access controls are the key to protecting the assets of an organization. Access must be managed at technical, administrative, and physical levels. This course is essential for security professionals looking to gain needed knowledge and perspective.
Access Controls and Identity Management are the heart of Information Security. In this course, Access Control and Identity Management, you will learn about the risks and challenges associated with access control concepts that a security professional must understand. First, you will discover the various access control attacks. Then, you will explore the methods of implementing and monitoring an access control system. Finally, you will learn about access control models and techniques. By the end of this course, you will know and understand the foundation of information security - access control.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview Hi everyone, my name is Kevin Henry, an information security consultant and educator and holder of several certifications in information security management, for example, the CISSP, CISM, and CCSO. I look forward to sharing knowledge and experience with you on my course on Access Control and Identity Management. This course will help you gain an essential understanding of the critical areas of access controls and discovering how to manage an identity management program as a part of information security management. It can be stated that access control is the very heart of an information security program, and therefore is a core responsibility of the information security manager. This course will address types of access controls, identification, authentication, authorization and accounting, and identity management and implementations. By the end of this course, you'll be knowledgeable in the processes and elements of access controls and identity management. I hope you'll join me on this journey to learn about these core concepts of access management and how this can help you in your role and career through this course at Pluralsight.