CIS 560 Security Access and Control Strategies
This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering, or destruction. This course defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. Topics include the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. In addition, security controls for access control including tokens, biometrics, and use of public key infrastructures (PKI) will be covered.