This unit discusses mechanisms by which a security system grants or revokes the right to access data or perform an action on information systems. Students will have the opportunity to explore a variety of methods available to manage systems and to identify various access control models and challenges associated with implementing these systems. The unit also focusses on critical issues in security operations covering auditing and monitoring the performance of security controls placed in the system to identify security events. It also covers the basic theories and best practices behind security incidents and incident response. This unit covers the Identity and Access Management and Security operations domains of Certified Information Systems Security Professional (CISSP) certification.
Semester 2 | 2019
NO TEXTBOOK REQUIRED
No products found in this collection