This course will teach you how to define user access controls necessary to address cybersecurity needs required to deliver successful technology solutions.
This course will teach you how to define user access controls necessary to address cybersecurity needs required to deliver successful technology solutions.
Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.