Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Certificate in Cybersecurity Analysis (IIBA®- CCA): User Access Controls

Description

This course will teach you how to define user access controls necessary to address cybersecurity needs required to deliver successful technology solutions. Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.

Tags

Certificate in Cybersecurity Analysis (IIBA®- CCA): User Access Controls

Affiliate notice

This course will teach you how to define user access controls necessary to address cybersecurity needs required to deliver successful technology solutions. Building technology solutions with the end user in mind is critical to shaping the access and permission controls required to ensure cybersecurity requirements are addressed. In this course, Certificate in Cybersecurity Analysis (IIBA®-CCA): User Access Controls, you’ll learn to define the user access controls required to address cybersecurity in your technology solutions. First, you’ll explore access control and authentication concepts. Next, you’ll learn how to define privileged account management and address the principle of least privilege. Finally, you’ll learn how to elicit user access requirements and define actions to help maintain cybersecurity. When you’re finished with this course, you’ll have the skills and knowledge to define and setup authorization requirements needed to ensure the success of your technology projects and solutions.