CIS 560 Security Access and Control Strategies
This course presents the concept of access control to protect information systems and applications from unauthorized viewing, tampering or destruction. This course defines the components of access control, provides a business framework for implementation and discusses legal requirements that impact access control programs. Topics include the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to mitigate these conditions. In addition, security controls for access control including tokens, biometrics and use of public key infrastructures will be covered.