Access Control and Security Architecture Design

Cybersecurity    |    Beginner
  • 13 videos | 46m 22s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.

WHAT YOU WILL LEARN

  • Recognize important elements in secure access control architecture design
    Describe identity and access management, including the iaaa process and related entities
    Describe various types of access control policies
    Recognize common access control models
    Describe centralized access control and its components
    Describe distributed access control, federated identity management frameworks, and supporting protocols
    Recognize the importance of access reviews and the steps required
  • Recognize access control considerations with bring your own device (byod) and internet of things (iot)
    Recognize important elements involved in updating a security architecture
    Recognize the impact of change, including laws and regulations, customer requirements, business and security policies, and business contracts and processes
    Describe life cycle management and the steps involved
    Describe considerations for architecture changes, including network, application, data, and access control architecture
    Recognize the importance of a change management policy and the steps involved

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.5 of 45 users Rating 4.5 of 45 users (45)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 154 users Rating 4.5 of 154 users (154)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)