Access controls determine the level of access that a security principal has to a network and its resources. Explore authentication mechanisms, trust architectures, the identity management life cycle, and specific access controls.
Learning Objectives
{"identify characteristics of authentication and the role it plays in access control"}
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Operational Planning
- Cyber Defense Infrastructure Support
- Cybersecurity Management
- Executive Cyber Leadership
- Systems Analysis
- Systems Development
- Threat Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.