Access Control, Authentication, and Public Key Infrastructure Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

The Access Control, Authentication, and Public Key Infrastructure Training course defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides learners with a professional resource detailing how to put access control systems to work in addition to how to test and manage them.

In addition to premium instructional content from Jones & Bartlett Learning’s comprehensive Information Systems Security and Assurance (ISSA) curriculum, this Access Control, Authentication, and Public Key Infrastructure Training course provides access to a customized “virtual sandbox” learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web browser, this Access Control, Authentication, and Public Key Infrastructure Training course allows you to practice “white hat” hacking on a real IT infrastructure—these are not simulations.

Winner of the “Security Training and Educational Programs” top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry’s leading information security research and advisory guide, these labs provide valuable exposure to complex, real-world challenges and over 200 hours of training exercises on how hackers and perpetrators use these applications and tools.

WHAT'S INCLUDED?
  • 5 days of Access Control, Authentication, and Public Key Infrastructure Training with an expert instructor
  • Access Control, Authentication, and Public Key Infrastructure Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this Access Control, Authentication, and Public Key Infrastructure Training course, learners will be able to meet these objectives:

  • Define authorization and access to an IT infrastructure based on an access control policy framework
  • Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls
  • Analyze how a data classification standard impacts an IT infrastructure’s access control requirements and implementation
  • Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access
  • Define proper security controls within the user domain to mitigate risks and threats caused by human behavior
  • Implement appropriate access controls for information systems within IT infrastructures
  • Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards
  • Implement a secure remote access solution
  • Implement PKI and encryption solutions to ensure the confidentiality of business communications
  • Mitigate risk from unauthorized access to IT systems through proper testing and reporting
CUSTOMIZE IT
  • We can adapt this Access Control, Authentication, and Public Key Infrastructure Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Access Control, Authentication, and Public Key Infrastructure course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Access Control, Authentication, and Public Key Infrastructure around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Access Control, Authentication, and Public Key Infrastructure course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this Access Control, Authentication, and Public Key Infrastructure course:

  • Information security analysts
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Access Control, Authentication, and Public Key Infrastructure course are:

COURSE SYLLABUS

The Need for Access Control Systems
  • Access Control Framework
  • Assessing Risk and Its Impact on Access Control
  • Business Drivers for Access Controls
  • Access Controls Law, Policies, and Standards
  • Security Breaches and the Law
Mitigating Risk with Access Control Systems, Authentication, and PKI
  • Mapping Business Challenges to Access Control Types
  • Human Nature and Organizational Behavior
  • Access Control for Information Systems
  • Physical Security and Access Control
  • Access Control in the Enterprise
Implementing, Testing, and Managing Access Control Systems
  • Access Control System Implementations
  • Access Control Solutions for Remote Workers
  • Public Key Infrastructure and Encryption
  • Testing Access Control Systems
  • Access Control Assurance

Labs

Lab 1: Assess the Impact on Access Controls for a Regulatory Case Study
Lab 2: Design Infrastructure Access Controls for a Network Diagram
Lab 3: Identify & Classify Data for Access Control Requirements
Lab 4: Implement Organizational-Wide Network and WLAN Access Controls
Lab 5: Enhance Security Controls for Access to Sensitive Data
Lab 6: Enhance Security Controls Leveraging Group Policy Objects
Lab 7: Design a Multi-factor Authentication Process
Lab 8: Align Appropriate PKI Solutions Based on Remote Access and Data Sensitivity
Lab 9: Apply Encryption to Mitigate Risk Exposure
Lab 10: Use Reconnaissance, Probing, & Scanning to Identify Servers and Hosts

Access Control, Authentication, and Public Key Infrastructure TrainingAccess Control, Authentication, and Public Key Infrastructure Training Course Recap, Q/A, and Evaluations

REQUEST MORE INFORMATION