Risk Management: Use of Access Controls to Protect Assets
- Offered byCoursera
Risk Management: Use of Access Controls to Protect Assets at Coursera Overview
Duration | 6 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Risk Management: Use of Access Controls to Protect Assets at Coursera Highlights
- Earn a Certificate upon completion
Risk Management: Use of Access Controls to Protect Assets at Coursera Course details
- In this course, we will focus on understanding risk management options and the use of access controls to protect assets
- We will start by examining the basic steps that must be in place to develop a security culture within the organization and impacting policies
- We will also look into how to write and use them to enforce security requirements
- Then we will move on to the actual business of controlling how our systems, services, resources, and data can be accessed safely by authorized persons
- We will also cover access control models like MAC, DAC, RBAC, and conclude the chapter with an examination of both LAN and WAN identity management
Risk Management: Use of Access Controls to Protect Assets at Coursera Curriculum
Module 1: Document, Implement, and Maintain Functional Security Controls
Welcome
Module 1 Overview
Applied Scenario 1 Review: Governance and Policies
Activity 1: Password Policy
Knowledge Check: Document, Implement, and Maintain Functional Controls
Access Control Fundamental Concepts
The Data Security Lifecycle
System Models: Biba and Bell-LaPadula
Applied Scenario 2: Access Controls
Knowledge Check: Access Control Model
Module 3: Identity Management Lifecycle
Types of Tokens
Biometric Data Security Standards
Knowledge Check: Certificates and Tokens
Activity 2: Biometric Identification
Case Study: Biometrics Data Transmission
Knowledge Check: Identity Management Maintenance
Knowledge Check: Privileged Access and Associated Risks
Knowledge Check: Identity Management
Knowledge Check: Identity Management Lifecycle
Module 4 Overview
Decentralized Access Control Management
Third-Party Connections
Identity as a Service (IDaaS)
Knowledge Check: Access Configuration
Knowledge Check: Authentication Methods
Module 5: Chapter 2 Review
Terms and Definitions
Chapter 2 Quiz: Understanding Risk Management Options and the Use of Access Controls to Protect Assets