The Access Control, Authentication, and Public Key Infrastructure training course defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides learners a professional resource detailing how to put access control systems to work in addition to how to test and manage them.
By attending Access Control, Authentication, and Public Key Infrastructure workshop, delegates will learn to:
- Define authorization and access to an IT infrastructure based on an access control policy framework
- Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls
- Analyze how a data classification standard impacts an IT infrastructure’s access control requirements and implementation
- Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access
- Define proper security controls within the user domain to mitigate risks and threats caused by human behavior
- Implement appropriate access controls for information systems within IT infrastructures
- Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards
- Implement a secure remote access solution
- Implement PKI and encryption solutions to ensure the confidentiality of business communications
- Mitigate risk from unauthorized access to IT systems through proper testing and reporting
General knowledge of networking and management information systems.
This Access Control, Authentication, and Public Key Infrastructure class is intended for Information security analysts.
