• Online, Self-Paced
Course Description

Without the ability to gain entry, hackers are powerless. Explore key authentication concepts and best practices like identification, user authentication, the user logon process, and how to effectively manage user account credentials.

Learning Objectives

{"describe characteristics of the authentication and identification process and the relationship between them"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Threat Analysis
  • Vulnerability Assessment and Management